Collected molecules will appear here. Add from search or explore.
Red Team Command & Control (C2) channel utilizing Google Sheets as a covert transport layer for encrypted communication.
Defensibility
stars
4
forks
1
C2viaGsheet is a classic implementation of 'Living off Trusted Sites' (LoTS), a technique where attackers use legitimate web services to mask malicious traffic. While the strategy is sound for bypassing basic firewall rules, this specific project is a low-defensibility script. With only 4 stars and no updates in over 4 years (1600+ days), the project is functionally abandoned. It lacks the sophisticated features required for modern operations, such as beacon jitter, multi-stage loaders, or advanced EDR evasion. Competitive landscape: It competes with more robust, maintained frameworks like 'Sliver', 'Empire', or commercial tools like 'Cobalt Strike' which have modular 'extenders' for GSheets/GDrive transport. Platform risk is high because Google (the platform provider) continuously improves detection for API-based C2 patterns within Google Workspace. Frontier labs like OpenAI or Google have no interest in building this as a product, but their security divisions (e.g., Google Mandiant) actively build detections to render such tools obsolete. The displacement horizon is '6 months' only because any script-kiddie or sophisticated actor would likely rewrite this from scratch or use a more modern framework rather than this specific, stale repository.
TECH STACK
INTEGRATION
cli_tool
READINESS