KittenBusters / CharmingKittenLinks
Exposing CharmingKitten's malicious activity for IRGC-IO  Counterintelligence division (1500)
☆284Updated 3 weeks ago
Alternatives and similar repositories for CharmingKitten
Users that are interested in CharmingKitten are comparing it to the libraries listed below
Sorting:
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆200Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆254Updated this week
- PoC that downloads an executable from a public SSL certificate☆130Updated 3 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆211Updated 6 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 4 months ago
- ShellSweeping the evil.☆180Updated 11 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆147Updated 3 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆219Updated 7 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆169Updated 5 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆125Updated 7 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆108Updated 3 months ago
- ☆42Updated 10 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 7 months ago
- ☆109Updated 3 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆247Updated 5 months ago
- ☆162Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- A community-driven collection of BloodHound queries☆153Updated 2 weeks ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆245Updated 4 months ago
- ☆114Updated 5 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆215Updated 6 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 7 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 5 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 4 months ago
- ☆190Updated last year
- Our Tips&Tricks☆126Updated 8 months ago
- The different ways to dump lsass☆193Updated 2 months ago