eric-conrad / c2-talkLinks
☆37Updated last year
Alternatives and similar repositories for c2-talk
Users that are interested in c2-talk are comparing it to the libraries listed below
Sorting:
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆89Updated 11 months ago
- ☆81Updated 8 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- ☆73Updated last week
- ☆24Updated 5 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 6 months ago
- Persist like a Dodder☆62Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 4 months ago
- https://lolad-project.github.io/☆79Updated 7 months ago
- ☆35Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆38Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆42Updated last week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆91Updated 4 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 5 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated last month
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 7 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆129Updated 6 months ago
- C2 Automation using Linode☆82Updated 2 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆144Updated 5 months ago
- PoC that downloads an executable from a public SSL certificate☆75Updated this week
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 4 months ago
- ☆59Updated 9 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆47Updated 6 months ago
- ☆57Updated 8 months ago
- Deploy a phishing infrastructure on the fly.☆72Updated 7 months ago
- Detect WFP filters blocking EDR communications☆93Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆62Updated 2 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year