BlackSnufkin / OdinEyeLinks
Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on the latest developments and news in Offensive Security World
☆18Updated 2 years ago
Alternatives and similar repositories for OdinEye
Users that are interested in OdinEye are comparing it to the libraries listed below
Sorting:
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆89Updated 2 months ago
- ☆24Updated 8 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated 2 weeks ago
- Lifetime AMSI bypass.☆35Updated 6 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated 10 months ago
- Utilities for obfuscating shellcode☆94Updated last month
- ☆61Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Updated 6 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 7 months ago
- ☆84Updated 3 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- A C2 framework built for my bachelors thesis☆56Updated last year
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- Permanently disable EDRs as local admin☆118Updated 3 weeks ago
- Most Responder's configuration power in your hand.☆51Updated 9 months ago
- ☆157Updated 4 months ago
- Deploy a phishing infrastructure on the fly.☆76Updated 10 months ago
- PoC that downloads an executable from a public SSL certificate☆130Updated 3 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆149Updated 3 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- A Rust-based dropper for shellcode payloads.☆67Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆97Updated 6 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆37Updated 2 months ago
- A small red team course☆39Updated 2 years ago
- ☆41Updated last year
- Vast.ai Password Kracking☆87Updated last week