maliciousgroup / C2_AutomationLinks
C2 Automation using Linode
☆82Updated 2 years ago
Alternatives and similar repositories for C2_Automation
Users that are interested in C2_Automation are comparing it to the libraries listed below
Sorting:
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- Automated exploitation of MSSQL servers at scale☆108Updated last week
- ☆69Updated last week
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 10 months ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- ☆158Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆177Updated 2 years ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆117Updated 2 months ago
- InfoSec Notes☆56Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆86Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆137Updated 9 months ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- https://lolad-project.github.io/☆76Updated 5 months ago
- ☆99Updated 3 years ago
- My Favorite Offensive Security Scripts☆71Updated last month
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆146Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆82Updated this week
- Tool to extract username and password of current user from PanGPA in plaintext☆84Updated 5 months ago
- Cortex XDR Config Extractor☆132Updated 2 years ago
- Lateral Movement☆125Updated last year
- ☆123Updated last year
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- ☆69Updated 2 months ago