MCP server for AdaptixC2
☆26Jul 20, 2025Updated 7 months ago
Alternatives and similar repositories for AdaptixC2_mcp
Users that are interested in AdaptixC2_mcp are comparing it to the libraries listed below
Sorting:
- ☆18Sep 24, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆30Dec 18, 2025Updated 2 months ago
- Cobalt Strike random C2 Profile generator☆16Updated this week
- ☆15Apr 29, 2023Updated 2 years ago
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆36Oct 7, 2025Updated 5 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Oct 29, 2022Updated 3 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- Bypass Medium paywalls on mobile. Paste or share a link to read instantly.☆30Feb 9, 2026Updated last month
- ☆11Apr 18, 2022Updated 3 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- Simple .NET assembly to interact with services.☆43Sep 27, 2019Updated 6 years ago
- example files to follow the MOOC on RTL-SDR☆12Mar 18, 2017Updated 8 years ago
- ☆15Sep 4, 2024Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool