malvuln / Adversary3
Malware vulnerability intel tool for third-party attackers
☆113Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for Adversary3
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135Updated last year
- C2 Automation using Linode☆78Updated 2 years ago
- ☆82Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆164Updated last year
- ☆94Updated last month
- Just my findings of malwares☆39Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 2 years ago
- Easy red team phishing with Puppeteer☆127Updated last year
- ☆130Updated last year
- Simple & Customizable DNS Data Exfiltrator☆106Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆146Updated last year
- ☆118Updated last year
- IOC Collection 2022☆55Updated last year
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆109Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- ☆96Updated 3 weeks ago
- ☆179Updated last year
- ☆61Updated 3 years ago
- A C# based tool for analysing malicious OneNote documents☆107Updated last year
- Hades Basic Command & Control Server☆84Updated 11 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆188Updated last month
- ☆95Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆249Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆92Updated 3 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆172Updated 10 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 10 months ago