dievus / Python3-C2-Course-Code-ModulesLinks
Modules for my C2 course students to use for their own projects.
β74Updated 2 years ago
Alternatives and similar repositories for Python3-C2-Course-Code-Modules
Users that are interested in Python3-C2-Course-Code-Modules are comparing it to the libraries listed below
Sorting:
- β99Updated 9 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD πβ90Updated last year
- Various AD tools needed for penetration testing in one place.β24Updated 2 years ago
- C2 Automation using Linodeβ85Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.β45Updated 3 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2β¦β85Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).β61Updated last year
- β52Updated last year
- a map for the azure oriented pentestsβ67Updated 2 years ago
- Labs & Code snippets for RRT on TTIβ40Updated 2 years ago
- β38Updated 4 years ago
- Powershell tools used for Red Team / Pentesting.β79Updated last year
- Azure Service Subdomain Enumerationβ67Updated last year
- β91Updated 2 years ago
- β38Updated 3 years ago
- β75Updated last month
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.β100Updated 3 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It empβ¦β78Updated 2 months ago
- A small executable to trick a user to authenticate using code matching MFAβ69Updated 2 years ago
- β61Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!β33Updated this week
- A collection of red blue team staffβ47Updated 2 years ago
- β42Updated 3 years ago
- Script related in Active Directory Attacks Domainβ22Updated 2 years ago
- β86Updated last year
- A collection of tools that I use in CTF's or for assessmentsβ102Updated 9 months ago
- β31Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDRβ15Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β103Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting commaβ¦β34Updated last year