hackerman008 / Control_FrameworkLinks
CONTROL C2 is a command and control framework designed for red teamers and penetration testers.
☆14Updated 8 months ago
Alternatives and similar repositories for Control_Framework
Users that are interested in Control_Framework are comparing it to the libraries listed below
Sorting:
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- ☆15Updated last year
- ☆34Updated 3 years ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- ☆47Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- Scripts that automate portions of pentests.☆51Updated last month
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- AzureAD Pentest☆20Updated 3 years ago
- A Moodle Scanner☆42Updated 7 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 2 months ago
- Most Responder's configuration power in your hand.☆51Updated 5 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆48Updated 5 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- ☆51Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- Azure Service Subdomain Enumeration☆61Updated 9 months ago
- Shellcode loader based on indirect syscall☆22Updated 4 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- ☆27Updated 2 years ago