dievus / Python3-C2-Course-Code-ModulesLinks
Modules for my C2 course students to use for their own projects.
☆74Updated 2 years ago
Alternatives and similar repositories for Python3-C2-Course-Code-Modules
Users that are interested in Python3-C2-Course-Code-Modules are comparing it to the libraries listed below
Sorting:
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- a map for the azure oriented pentests☆70Updated 2 years ago
- ☆106Updated 11 months ago
- ☆90Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- ☆95Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆46Updated 6 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Updated last week
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- ☆37Updated 4 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago
- Azure Service Subdomain Enumeration☆70Updated last year
- ☆42Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- ☆52Updated last year
- Labs & Code snippets for RRT on TTI☆40Updated 3 years ago
- A collection of red blue team staff☆48Updated 2 years ago
- Script related in Active Directory Attacks Domain☆24Updated 2 years ago
- ☆39Updated 4 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 3 years ago
- ☆63Updated last month
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- My Favorite Offensive Security Scripts☆83Updated 9 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- A collection of tools that I use in CTF's or for assessments☆107Updated last year