eric-conrad / c2-talk
☆36Updated 10 months ago
Alternatives and similar repositories for c2-talk:
Users that are interested in c2-talk are comparing it to the libraries listed below
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 8 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 5 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆48Updated last week
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated 3 weeks ago
- A simple tool designed to create Atomic Red Team tests with ease.☆36Updated 2 months ago
- ☆80Updated 2 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 months ago
- ☆34Updated last year
- Deploy a phishing infrastructure on the fly.☆67Updated last month
- ☆32Updated last year
- BloodHound PowerShell client☆49Updated this week
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆74Updated last month
- Windows Administrator level Implant.☆48Updated 4 months ago
- https://lolad-project.github.io/☆71Updated last month
- ☆52Updated 2 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆108Updated 3 months ago
- Detect WFP filters blocking EDR communications☆85Updated last year
- Yara Rules for Modern Malware☆73Updated 11 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆29Updated 8 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆73Updated 2 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆82Updated last month
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 4 months ago