badsectorlabs / ludus_adaptix_c2View external linksLinks
An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts
☆179May 28, 2025Updated 8 months ago
Alternatives and similar repositories for ludus_adaptix_c2
Users that are interested in ludus_adaptix_c2 are comparing it to the libraries listed below
Sorting:
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,697Updated this week
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆152Dec 26, 2025Updated last month
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,290Jun 17, 2025Updated 7 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆381Dec 13, 2024Updated last year
- 64-bit, position-independent implant template for Windows in Rust.☆172Nov 28, 2025Updated 2 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- A PoC for Early Cascade process injection technique.☆208Jan 30, 2025Updated last year
- AdaptixFramework Extension Kit☆403Feb 8, 2026Updated last week
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Nov 27, 2024Updated last year
- Exploitation of echo_driver.sys☆170Sep 16, 2023Updated 2 years ago
- C2 Infrastructure Automation☆118Jun 21, 2025Updated 7 months ago
- ☆55May 31, 2025Updated 8 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated last week
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆635May 8, 2025Updated 9 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆621Jun 25, 2024Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆323May 17, 2024Updated last year
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 10 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆264May 15, 2025Updated 8 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 7 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288May 27, 2024Updated last year
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆199Apr 21, 2025Updated 9 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆282Apr 6, 2025Updated 10 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆335Jun 2, 2025Updated 8 months ago
- ☆82Apr 28, 2025Updated 9 months ago
- ☆163Nov 19, 2025Updated 2 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆177Jan 6, 2026Updated last month
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- Backend development stack for agents☆29Jul 30, 2025Updated 6 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Nov 12, 2025Updated 3 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆245Nov 2, 2025Updated 3 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆219Nov 3, 2025Updated 3 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Mar 10, 2025Updated 11 months ago
- ☆650Feb 6, 2026Updated last week
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆354Jan 8, 2026Updated last month