c1b3r-n0t3s
search
⌘Ctrlk
Github
c1b3r-n0t3s
  • HOME
  • c1b3r-n0t3s
  • notes
    • Crack zip files
    • Crack Password Hashes (Sites) 🤡
    • Docker Hacking 🐳
    • Esoteric languages 💢
    • Login without password to FTP
    • File Sharing 🌶️
    • File uploading malware 🫨
    • Complete list of HTTP Status Codes
    • Import a .asc key 🪡
    • JWT tokens 🐧
    • Kernel exploitation 🍀
    • LFI 🎃
    • MongoDB 🥒
    • Mysql 🫖
    • How to deal with a Redis database?
    • Reverse shells 👾
    • SMB 🐿
    • SSH 🔓
    • Spectrograms 🥠
    • Investigate image metadata
    • Strange privesc on Linux 🍄
    • Subdomain enumeration 🌞
    • Tools webpages
    • Translation and Shifting (Format encoding) 🥭
    • Turn usb into rubber ducky 🐥
    • Useful scripts 🌊
    • Web Enumeration 🐏
    • WiFi Hacking 🌐
    • Wordpress 🍔
    • XSS attacks 💀
    • Burp Suite 🏀
    • Exploits
    • Introduction to Web Hacking 😀
    • Linux things 🟢
    • Metasploit 💦
    • Network Security 🩻
    • Privilege Escalation 🧊
    • Protocols 🌧
    • Tools 🛠
    • Vunerability research 🦑
    • Windows things 🔵
    • img
    • Red Teaming 🎈
      • Fundamentals 📝
        • Intro to C2 ✴️
          • Advanced C2 Setups 🌠
          • C2 Operations Basics 📲
          • Command and Control Framework Structure 📐
          • Sample Exploit
          • Common C2 Frameworks 🏕
          • Setting up a C2 Framework 🕌
        • Red Team Engagements 🦸‍♂️
        • Red Team Fundamentals 💂
        • Red Team OPSEC 🚷
        • Red Team Threat Intelligence 👨🏾‍💻
      • Initial Access ✂️
      • Post Compromise 🤬
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. noteschevron-right
  2. Red Teaming 🎈chevron-right
  3. Fundamentals 📝

Intro to C2 ✴️

Advanced C2 Setups 🌠chevron-rightC2 Operations Basics 📲chevron-rightCommand and Control Framework Structure 📐chevron-rightSample Exploitchevron-rightCommon C2 Frameworks 🏕chevron-rightSetting up a C2 Framework 🕌chevron-right

Last updated 2 years ago