grisuno / LazyOwn
LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectable malleable implants compatible with Windows/Linux/Mac OSX, and self-configuring backdoors. With its Web interface and powerful Console Client, it is the best combination for your RedTeam/APT campaigns.
☆57Updated this week
Alternatives and similar repositories for LazyOwn
Users that are interested in LazyOwn are comparing it to the libraries listed below
Sorting:
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 4 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆44Updated 3 weeks ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆110Updated 4 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 9 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- ☆103Updated 8 months ago
- ☆26Updated 2 years ago
- ☆62Updated last year
- ☆18Updated last year
- ☆67Updated 2 weeks ago
- PowerShell Obfuscator☆174Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 3 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- ☆39Updated 4 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 8 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- ☆58Updated 7 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 8 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆26Updated last year
- Azure Service Subdomain Enumeration☆59Updated 8 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 3 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated 11 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆67Updated last month
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year