badsectorlabs / ludus_adaptix_c2Links
An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts
☆170Updated 5 months ago
Alternatives and similar repositories for ludus_adaptix_c2
Users that are interested in ludus_adaptix_c2 are comparing it to the libraries listed below
Sorting:
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆174Updated 2 weeks ago
- ☆99Updated 9 months ago
- Continuous password spraying tool☆195Updated 3 weeks ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆213Updated 6 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆256Updated 8 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 4 months ago
- ☆78Updated 6 months ago
- ☆154Updated 7 months ago
- A community-driven collection of BloodHound queries☆153Updated last month
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆217Updated 7 months ago
- ☆144Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆221Updated 7 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆164Updated 4 months ago
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆335Updated last week
- Generate and Manage KeyCredentialLinks☆177Updated last month
- ☆161Updated last year
- C2 Infrastructure Automation☆113Updated 4 months ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆159Updated 3 months ago
- Everything and anything related to password spraying☆150Updated last year
- ☆117Updated 5 months ago
- The different ways to dump lsass☆195Updated 3 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆264Updated last month
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- Python based GUI for browsing LDAP☆171Updated 2 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆265Updated last year