dievus / Python3-C2-Course-Code-ModulesLinks
Modules for my C2 course students to use for their own projects.
☆74Updated 2 years ago
Alternatives and similar repositories for Python3-C2-Course-Code-Modules
Users that are interested in Python3-C2-Course-Code-Modules are comparing it to the libraries listed below
Sorting:
- ☆87Updated 6 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- ☆78Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- ☆92Updated 2 years ago
- ☆59Updated 10 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 6 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆51Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 3 weeks ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 6 months ago
- My Favorite Offensive Security Scripts☆75Updated 4 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated last month
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- C2 Automation using Linode☆84Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- Azure Service Subdomain Enumeration☆65Updated 11 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 4 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- ☆55Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- ☆42Updated 3 years ago
- ☆65Updated 2 years ago