gl4ssesbo1 / NebulaView external linksLinks
Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
☆627May 28, 2025Updated 8 months ago
Alternatives and similar repositories for Nebula
Users that are interested in Nebula are comparing it to the libraries listed below
Sorting:
- A C2 post-exploitation framework☆483Jan 24, 2024Updated 2 years ago
- Hide your payload in DNS☆617May 3, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,722Jan 16, 2026Updated 3 weeks ago
- ☆539Nov 20, 2021Updated 4 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,364Oct 27, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Aug 18, 2023Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆720Aug 17, 2021Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503May 16, 2023Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,151Apr 17, 2025Updated 9 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- Open source C2 server created for stealth red team operations☆838Sep 26, 2022Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆821Oct 27, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,869Aug 18, 2023Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆233Feb 15, 2021Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆711Dec 6, 2024Updated last year
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆347Sep 1, 2021Updated 4 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,398Nov 22, 2023Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,497Dec 21, 2023Updated 2 years ago
- Small and convenient C2 tool for Windows targets☆612Mar 8, 2022Updated 3 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆633Oct 18, 2025Updated 3 months ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Jun 10, 2022Updated 3 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 2 months ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,192Apr 16, 2025Updated 9 months ago
- A .NET tool for exporting and importing certificates without touching disk.☆499Oct 8, 2021Updated 4 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 3 months ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆439Jan 8, 2022Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Oct 19, 2022Updated 3 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,097Jun 25, 2024Updated last year
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,594Jul 10, 2023Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆4,296Updated this week
- Beacon Object File Loader☆294Dec 3, 2023Updated 2 years ago