grisuno / LazyOwn
LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and self-configuring backdoors. With its Web interface and powerful Console Client, it is the best combination for your RedTeam/APT campaigns.
☆39Updated 2 weeks ago
Alternatives and similar repositories for LazyOwn:
Users that are interested in LazyOwn are comparing it to the libraries listed below
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆40Updated 7 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 10 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated 11 months ago
- Pentest/Red Team: Resources, repos and scripts.☆65Updated 3 weeks ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆44Updated 10 months ago
- Nmap & SQL injection automation tool☆31Updated 4 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆66Updated 11 months ago
- Chrome extension tool for OSINT & Recon☆51Updated 11 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆96Updated last year
- OSINT tool for username, email and domains☆27Updated 9 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆125Updated 7 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 5 months ago
- Hacking with PasteJacking technique☆21Updated 7 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆42Updated last month
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆23Updated 3 years ago
- ☆21Updated 2 years ago
- Tools and Resources for Physical Security Red Teaming☆30Updated last month
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆59Updated 3 years ago
- ☆26Updated 2 years ago
- Challenge Python☆19Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated last month
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 5 months ago
- IoT Camera Reconnaissance and Live Viewer☆139Updated 6 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆56Updated 2 weeks ago