KittenBusters / CharmingKittenLinks
Exposing CharmingKitten's malicious activity for IRGC-IO Counterintelligence division (1500)
☆186Updated this week
Alternatives and similar repositories for CharmingKitten
Users that are interested in CharmingKitten are comparing it to the libraries listed below
Sorting:
- PoC that downloads an executable from a public SSL certificate☆127Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆192Updated last week
- A delicious, but malicious SSL-VPN server 🌮☆250Updated last week
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆196Updated 11 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated 2 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆93Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆210Updated 5 months ago
- ☆160Updated 2 years ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated 4 months ago
- Our Tips&Tricks☆126Updated 7 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- ☆324Updated last month
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆141Updated 7 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆245Updated 5 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆107Updated 2 months ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆93Updated 6 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆265Updated 10 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆124Updated 8 months ago
- The different ways to dump lsass☆190Updated last month
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆168Updated 4 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆152Updated 2 weeks ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 7 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆123Updated 6 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆199Updated 7 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆329Updated last month
- ☆134Updated last week
- SharePoint WebPart Injection Exploit Tool☆277Updated 2 months ago