kaganisildak / c2tify
Using Spotify Playlists as Malware CDN
☆24Updated 3 years ago
Alternatives and similar repositories for c2tify:
Users that are interested in c2tify are comparing it to the libraries listed below
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- material for exploit development☆16Updated 5 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆72Updated 3 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Liberating dem proprietary APT implants☆21Updated 5 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆20Updated last month
- Spin up RedTeam infrastructure on AWS via Ansible☆59Updated 4 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 4 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Manticore Adversary Emulation Cli☆46Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 3 years ago
- ☆11Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago