eric-conrad / c2-talkLinks
☆37Updated last year
Alternatives and similar repositories for c2-talk
Users that are interested in c2-talk are comparing it to the libraries listed below
Sorting:
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated 2 weeks ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- ☆82Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 6 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆87Updated last month
- ☆24Updated 6 months ago
- Persist like a Dodder☆64Updated 3 months ago
- The different ways to dump lsass☆116Updated 3 weeks ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆92Updated 5 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 3 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 7 months ago
- PoC that downloads an executable from a public SSL certificate☆127Updated last month
- https://lolad-project.github.io/☆80Updated 8 months ago
- A small red team course☆39Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 6 months ago
- Detect WFP filters blocking EDR communications☆93Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 6 months ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- ☆61Updated 11 months ago
- information about ransomware groups (Ransomware Analysis Notes)☆38Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 11 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 7 months ago
- ☆35Updated last year
- Deploy a phishing infrastructure on the fly.☆75Updated 8 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆41Updated 2 months ago