
In recent times, open-source Command and Control (C2) frameworks have become indispensable tools for red-teaming assessments and adversary simulations. These frameworks are pivotal for post-exploitation tasks, allowing operators to manage compromised systems and orchestrate complex campaigns. However, recent studies have spotlighted significant vulnerabilities within these tools, exposing them to Remote Code Execution (RCE) attacks and other threats. Are these vulnerabilities