C2Matrix Automation
☆15Sep 10, 2023Updated 2 years ago
Alternatives and similar repositories for C2Matrix-Automation
Users that are interested in C2Matrix-Automation are comparing it to the libraries listed below
Sorting:
- Educational repository with source code examples☆12Jun 3, 2025Updated 8 months ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- ☆16Jul 19, 2021Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Google Hacking using Prompt ChatGPT☆16Jun 3, 2023Updated 2 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- ☆16Nov 24, 2019Updated 6 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- ☆13Nov 4, 2019Updated 6 years ago
- ZAP add-on containing the web-backdoors and attack files from FuzzDB☆20Feb 1, 2026Updated 3 weeks ago
- ☆18Sep 2, 2021Updated 4 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆38Aug 4, 2025Updated 6 months ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- BlackHat scrapy for download all the pdf file☆30Jun 7, 2024Updated last year
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- ☆111May 30, 2021Updated 4 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago