A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).
-
Updated
Dec 17, 2025 - C
A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).
An open-source security AI agent that brings tactical hacking intelligence directly into your terminal
Add a description, image, and links to the offensive-security-tooling topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security-tooling topic, visit your repo's landing page and select "manage topics."