UnkL4b / BabyShark
Basic C2 Server
☆183Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for BabyShark
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆174Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆106Updated last year
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆211Updated 2 years ago
- Enumerate Domain Data☆316Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆309Updated last year
- Malicious Shortcut(.lnk) Generator☆173Updated 6 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆197Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆168Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆165Updated last year
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆255Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆216Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆241Updated last year
- scan for NTLM directories☆346Updated 4 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135Updated last year
- HoneyCreds network credential injection to detect responder and other network poisoners.☆214Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆109Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆424Updated last year
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆425Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆221Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆307Updated last month
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆372Updated last year
- Kerberoast attack -pure python-☆421Updated 11 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆92Updated 3 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆258Updated 2 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆163Updated 2 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆139Updated 3 years ago
- ☆180Updated last year
- [POC] Asynchronous reverse shell using the HTTP protocol.☆264Updated 3 years ago