ProcessusT / Automated-C2Links
Automate your C2 creation with Azure Frontdoor and randomly generated options
☆13Updated 8 months ago
Alternatives and similar repositories for Automated-C2
Users that are interested in Automated-C2 are comparing it to the libraries listed below
Sorting:
- Obfuscate the bytes of your payload with an association dictionary☆61Updated last week
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆153Updated last month
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 11 months ago
- ☆70Updated last month
- C++ Reflective Assembly Loader☆26Updated 3 months ago
- Continuous password spraying tool☆186Updated 3 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆20Updated 5 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆156Updated 4 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆90Updated 11 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆66Updated this week
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ☆64Updated 2 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆151Updated 2 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆130Updated 2 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆108Updated 2 months ago
- ☆84Updated 3 months ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- ☆97Updated last week
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 4 months ago
- PowerShell Obfuscator☆178Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆96Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆144Updated last month
- ☆39Updated 5 months ago
- A collection of Cobalt Strike Aggressor scripts.☆96Updated 3 years ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆104Updated this week
- Inject RDPThief into memory with PowerShell.☆64Updated 4 months ago
- ☆59Updated 8 months ago