diff --git a/README.md b/README.md index 9fd2238..8039279 100644 --- a/README.md +++ b/README.md @@ -39,6 +39,7 @@ Table of Contents * [Baby Shark](https://github.com/UnkL4b/BabyShark): basic C2 generic server written in Python and Flask. * [C3](https://github.com/FSecureLABS/C3): framework that extends other red team tooling, such as the commercial Cobalt Strike (CS) product via ExternalC2, which is supported at release. * [Caldera](https://github.com/mitre/caldera): built on the MITRE ATT&CK™ framework and an active research project at MITRE. +* [Havoc](https://github.com/HavocFramework/Havoc): is a modern, malleable post-exploitation command and control framework made for penetration testers, red teams, and blue teams. * [CHAOS](https://github.com/tiagorlampert/CHAOS): PoC that allow payloads generation and control remote operating systems * [Dali](https://github.com/h0mbre/Dali): image-based C2 channel which utilizes Imgur to host images and task agents. * [Empire](https://github.com/BC-SECURITY/Empire): post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent @@ -108,4 +109,4 @@ Table of Contents * [RedViper](https://www.youtube.com/watch?v=rk4EMhq30-M) * [Command & Control tools course](https://www.youtube.com/watch?v=bUqu8fh7xUg), in Pt-Br language. -* [How Hackers Use Discord To Control Victim PC’s](https://www.youtube.com/watch?v=_OXyb_Oxmjg) \ No newline at end of file +* [How Hackers Use Discord To Control Victim PC’s](https://www.youtube.com/watch?v=_OXyb_Oxmjg)