A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2
☆18Jan 3, 2020Updated 6 years ago
Alternatives and similar repositories for BadSalt
Users that are interested in BadSalt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Modular C2 server to tame your pack of wolves☆22Mar 14, 2026Updated last week
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆24Dec 8, 2022Updated 3 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- Cumulus is web application weakness monitoring, works with just 3 code lines☆40Jan 27, 2023Updated 3 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 4 months ago
- A Burp Suite extension for headless, unattended scanning.☆37Jun 24, 2020Updated 5 years ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Apr 4, 2022Updated 3 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- ☆13Nov 3, 2023Updated 2 years ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Nov 11, 2018Updated 7 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- A simple demo getting JMX metrics from a docker container☆12Feb 3, 2016Updated 10 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Bash Bunny fun!☆52May 24, 2018Updated 7 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Feb 28, 2020Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago