lum8rjack / caddy-c2View external linksLinks
Caddy v2 module to filter requests based on C2 profiles
☆46Apr 24, 2025Updated 9 months ago
Alternatives and similar repositories for caddy-c2
Users that are interested in caddy-c2 are comparing it to the libraries listed below
Sorting:
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆57Dec 15, 2025Updated 2 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆45Jan 14, 2026Updated last month
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 5 months ago
- Just another EDR killer☆94Jan 21, 2026Updated 3 weeks ago
- collection of blogs about malware development and analysis☆64Dec 2, 2025Updated 2 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated last month
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- ☆65Mar 15, 2024Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- ☆59Dec 10, 2025Updated 2 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆260Feb 5, 2026Updated last week
- ☆30Oct 13, 2025Updated 4 months ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 2 months ago
- Lockless BOF☆79May 2, 2025Updated 9 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆85Aug 26, 2025Updated 5 months ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆90Oct 13, 2024Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 weeks ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Dec 31, 2025Updated last month
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆268Dec 15, 2025Updated 2 months ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆129Nov 12, 2025Updated 3 months ago
- ☆83Nov 1, 2023Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆142Updated this week
- Tools I use on red team engagements and more☆33Mar 14, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Feb 13, 2025Updated last year
- Rust implementation of the Process Herpaderping☆25Jul 6, 2023Updated 2 years ago
- Fast Windows post-exploitation wins after initial access.☆28Jan 28, 2026Updated 2 weeks ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Nov 27, 2025Updated 2 months ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 8 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆272Sep 14, 2023Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆38Jan 12, 2026Updated last month