• Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    PoshC2

    PoshC2

    C2 framework used to aid red teamers with post-exploitation

    ...These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX. Shellcode containing in-build AMSI bypass and ETW patching for a high success rate and stealth. Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting your C2 infrastructure and maintaining good operational security. Fully encrypted communications, protecting the confidentiality and integrity of the C2 traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Sliver

    Sliver

    Adversary Emulation Framework

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys. The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
    Downloads: 62 This Week
    Last Update:
    See Project
  • 3
    SHAD0W

    SHAD0W

    A post exploitation framework designed to operate covertly

    ...Dynamically resolved syscalls are heavily used to avoid userland API hooking, anti-DLL injection to make it harder for EDR to load code into the beacons, and official Microsoft mitigation methods to protect spawn processes. Runs fully inside of Docker allowing cross-platform usage. SHAD0W is a modular C2 framework designed to successfully operate on mature environments. All traffic between beacons and the C2 are encrypted and transmitted over HTTPS.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    StrategyStateGenerator

    Generator for strategy and/or state pattern code in Java

    New version 2.0.4 is available since April, 4th 2017 ========================================= Please download from here: https://sourceforge.net/projects/strategystategenerator/files/strategy-state-generator-2.0.4/ Description =========== The *Strategy/State Generator* creates Java Source Code for classes representing strategies of strategy pattern or states of state pattern in a half-automated way. The *State Pattern* and the *Strategy Pattern* are from a technical view identical (see [Design Pattern](http://c2.com/cgi/wiki?StrategyPattern)). Thus the ancestor project [Strategy Generator](https://sourceforge.net/projects/strategygenerator/) has been adapted as new project *Strategy/State Generator* to generate also *State Pattern* Java source code. Please, note, that the API of this project and [Strategy Generator](https://sourceforge.net/projects/strategygenerator/) are similar but not identical. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    PowerSploit PowerShell

    PowerSploit PowerShell

    A PowerShell Post-Exploitation Framework

    PowerSploit is a collection of PowerShell modules that historically served as a toolkit for post-exploitation tasks, red-team exercises, and offensive-security research—covering areas like reconnaissance, lateral movement, persistence, and situational awareness. The repository bundles many focused scripts: code to enumerate system and Active Directory information, payload generation helpers, in-memory execution utilities, and modules to interact with credentials and services. Because the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    ontocomp

    OntoComP is a Protégé 4 plug-in for completing OWL ontologies

    ...It enables the user to check whether an OWL ontology contains "all relevant information" about the application domain, and extends the ontology appropriately if this is not the case. It achieves this by asking the user questions of the form "are instances of classes C1 and C2 also instances of class C3?". If the user confirms such a question, then a new axiom of the application domain that does not follow from the ontology has been discovered, and it is added to the ontology. If the user rejects it, the user has to give a counterexample to this question, i.e., an individual that is an instance of C1, C2 and not C3. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This project has been set up to unify perl unit testing frameworks for use in Extreme Programming. See also http://c2.com/cgi/wiki?PerlUnit
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    LDAP Enabled Application Framework(LEAFs), is a J2EE based application framework that couples a strong security model with MVC. The security of LEAFs is modeled after the TCSEC Class 2 (C2) security specification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB