maliciousgroup / C2_Automation
C2 Automation using Linode
☆79Updated 2 years ago
Alternatives and similar repositories for C2_Automation:
Users that are interested in C2_Automation are comparing it to the libraries listed below
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆108Updated 3 months ago
- ☆147Updated 11 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- linikatz is a tool to attack AD on UNIX☆142Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Easy red team phishing with Puppeteer☆127Updated 2 years ago
- ☆113Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- ☆96Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆91Updated last year
- PowerShell Reverse Shell☆61Updated last year
- https://lolad-project.github.io/☆71Updated last month
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 6 months ago
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆131Updated 6 months ago
- InfoSec Notes☆56Updated 10 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆134Updated 6 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated last week
- Tool to extract username and password of current user from PanGPA in plaintext☆82Updated last month
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆146Updated last year
- BloodHound PowerShell client☆49Updated this week
- ☆42Updated 2 weeks ago
- ☆105Updated 3 months ago
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- Generate graphs and charts based on password cracking result☆156Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year