LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and self-configuring backdoors. With its Web interface and powerful Console Client, it is the best combination for your RedTeam/APT campaigns.
☆159Mar 18, 2026Updated last week
Alternatives and similar repositories for LazyOwn
Users that are interested in LazyOwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Thats it! An Open-Source Windows UEFI Rootkit☆29Jul 19, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Stealthily inject shellcode into an executable☆456Oct 19, 2025Updated 5 months ago
- Privilege Escalation using Passwd - April Fools prank☆37Apr 3, 2025Updated 11 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 4 months ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated 3 weeks ago
- Output the SSH private key to the correct Open SSH format for use☆10Nov 3, 2024Updated last year
- shellcode transformation tool for YARA evasion☆58Dec 17, 2025Updated 3 months ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- ☆53Jul 8, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A discord Remote Administration Tool. Easy to use, undetected and powerfull.☆22Mar 16, 2026Updated last week
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆119Jan 25, 2026Updated 2 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆18Updated this week
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆103Dec 16, 2025Updated 3 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,330Nov 12, 2025Updated 4 months ago
- Generate an Alphabetical Polymorphic Shellcode☆137Aug 19, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆271Feb 13, 2026Updated last month
- ddos_tool_2025 – Powerful open‑source framework for stress testing & DDoS resilience. Supports multi‑layer attacks (L3/L4/L7), Cloudflare…☆22Jul 30, 2025Updated 7 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Nov 2, 2025Updated 4 months ago
- DarkStar is a Premium Hacking Tools. You can buy by contacting me☆26Oct 27, 2024Updated last year
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆45Apr 27, 2025Updated 10 months ago
- Exploitation of CVE-2025-29969☆57Feb 20, 2026Updated last month
- ☆24Feb 15, 2026Updated last month
- Simple .NET loader for loading and executing Powershell payloads☆17Nov 5, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆156Nov 28, 2025Updated 3 months ago
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 7 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,839Mar 17, 2026Updated last week
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆95Aug 23, 2025Updated 7 months ago
- ☆18Sep 27, 2025Updated 5 months ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆39Sep 23, 2023Updated 2 years ago
- A Multi Functional Tool Kit For Hackers And Programmers In Python Language Including Information Gathering,BruteForce Attack,Social Media…☆10Nov 26, 2023Updated 2 years ago