grisuno / LazyOwnLinks
LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and self-configuring backdoors. With its Web interface and powerful Console Client, it is the best combination for your RedTeam/APT campaigns.
☆115Updated this week
Alternatives and similar repositories for LazyOwn
Users that are interested in LazyOwn are comparing it to the libraries listed below
Sorting:
- PowerShell Obfuscator☆211Updated 2 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated 2 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆65Updated 10 months ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- ☆24Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆211Updated 6 months ago
- What the name says....☆101Updated last year
- Polymorphic Command & Control☆98Updated 7 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆139Updated 9 months ago
- ☆77Updated 6 months ago
- ☆65Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆219Updated 7 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Repo containing cracked red teaming tools.☆196Updated 2 months ago
- ☆105Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆53Updated 4 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆295Updated 2 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆93Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆125Updated 7 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆200Updated 3 weeks ago
- PDF dropper Red Team Scenairos☆224Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆124Updated 5 months ago
- A blind SQL injection brute forcer☆111Updated 6 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- Dark-Shell is a Tool for Generating ReverShell File☆114Updated 2 months ago