BC-SECURITY / Long-Live-The-EmpireLinks
A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing on the open-source Empire C2 framework.
☆106Updated 2 years ago
Alternatives and similar repositories for Long-Live-The-Empire
Users that are interested in Long-Live-The-Empire are comparing it to the libraries listed below
Sorting:
- https://lolad-project.github.io/☆83Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Updated 3 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- ☆105Updated 2 years ago
- All kinds of tiny shells☆65Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- InfoSec Notes☆60Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- My Favorite Offensive Security Scripts☆79Updated 8 months ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- a map for the azure oriented pentests☆68Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- ☆102Updated last month
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆217Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- ☆41Updated last year
- ☆99Updated 4 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆151Updated 2 weeks ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago