AdaptixC2 is a highly modular advanced redteam toolkit
☆2,733Updated this week
Alternatives and similar repositories for AdaptixC2
Users that are interested in AdaptixC2 are comparing it to the libraries listed below
Sorting:
- AdaptixFramework Extension Kit☆428Updated this week
- 渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理☆1,383Feb 28, 2025Updated last year
- The Havoc Framework☆8,190Dec 18, 2025Updated 2 months ago
- Windows remote execution multitool☆783Oct 1, 2025Updated 5 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,821Nov 3, 2024Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,296Jun 17, 2025Updated 8 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- Pillager是一个适用于后渗透期间的信息收集工具☆1,268Sep 7, 2024Updated last year
- Remove AV/EDR Kernel ObRegisterCallbacks、CmRegisterCallback、MiniFilter Callback、PsSetCreateProcessNotifyRoutine Callback、PsSetCreateThrea…☆1,294Jun 21, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,408Jan 19, 2026Updated last month
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆622Jun 25, 2024Updated last year
- Next Generation C2 Framework, IoM-server/client☆414Updated this week
- Adversary Emulation Framework☆10,717Feb 23, 2026Updated last week
- HVNC for Cobalt Strike☆1,298Dec 7, 2023Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆607Feb 21, 2024Updated 2 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,562Aug 20, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 9 months ago
- A BOF that runs unmanaged PEs inline☆681Oct 23, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- Situational Awareness commands implemented using Beacon Object Files☆1,722Updated this week
- Remote operations commands implemented using Beacon Object Files☆1,120Updated this week
- A C# Command & Control framework☆1,026Mar 28, 2024Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,401Nov 22, 2023Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆614Jan 2, 2025Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- A modern 32/64-bit position independent implant template☆1,295Mar 21, 2025Updated 11 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆458Aug 2, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,011Jan 7, 2026Updated last month
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- EDR Lab for Experimentation Purposes☆1,413Updated this week
- Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods…☆1,407Feb 9, 2026Updated 2 weeks ago
- Supershell C2 远控平台,基于反向SSH隧道获取完全交互式Shell☆1,773Sep 26, 2023Updated 2 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆281Apr 6, 2025Updated 10 months ago
- A collaborative, multi-platform, red teaming framework☆4,318Feb 19, 2026Updated last week
- 一款专注于 Java 主流 Web 中间件的内存马快速生成工具,致力于简化安全研究人员和红队成员的工作流程,提升攻防效率☆1,339Feb 8, 2026Updated 3 weeks ago
- COM ViewLogger — new malware keylogging technique☆404Jan 6, 2025Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,462Jul 8, 2025Updated 7 months ago