bluesentinelsec / RedNimbusC2Links
A serverless C2 framework
☆14Updated 3 years ago
Alternatives and similar repositories for RedNimbusC2
Users that are interested in RedNimbusC2 are comparing it to the libraries listed below
Sorting:
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- Posts about different topics☆39Updated 5 months ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Updated 6 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Files to automatically deploy red team Active Directory test lab☆49Updated 3 years ago
- ☆59Updated 2 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Updated 4 years ago
- ☆19Updated 3 years ago
- ☆84Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- ☆20Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆40Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 4 years ago
- ☆18Updated last month
- ☆49Updated 4 months ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- ☆94Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 6 months ago
- ☆65Updated 3 weeks ago
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago