kunpen / Havoc-C2Links
The Havoc Framework
☆60Updated 3 years ago
Alternatives and similar repositories for Havoc-C2
Users that are interested in Havoc-C2 are comparing it to the libraries listed below
Sorting:
- Generate FUD backdoors☆262Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆317Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆433Updated last month
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆115Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- A RedTeam Toolkit☆409Updated 3 months ago
- ☆309Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆181Updated 2 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆108Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆67Updated 10 months ago
- Simple CLI program that will fetch and convert a HackTheBox Academy module into a local file in Markdown format.☆51Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆221Updated 7 months ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆260Updated last month
- Simple HTTP listener for security testing☆117Updated 11 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆176Updated last year
- This is for Ethical Use only.☆440Updated 5 months ago
- Scripts for offensive security☆168Updated 5 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆469Updated 5 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆426Updated last year
- Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim. Docker version of WiFiChallenge La…☆318Updated last week
- A compact guide to network pivoting for penetration testings / CTF challenges.☆217Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆182Updated last year
- PowerShell Obfuscator☆216Updated 2 months ago
- Lab used for workshop and CTF☆345Updated this week
- Sliver CheatSheet for OSEP☆202Updated last month
- Certified Red Team Operator☆437Updated 3 years ago
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.☆294Updated 3 months ago
- winPEAS, but for Active Directory☆165Updated 7 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆425Updated 10 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆346Updated 2 years ago