nickvangilder / most-average-c2-everLinks
The most average C2 ever (MACE)
β97Updated 3 years ago
Alternatives and similar repositories for most-average-c2-ever
Users that are interested in most-average-c2-ever are comparing it to the libraries listed below
Sorting:
- Ansible + Vagrant + Hyper-V + Vulnerable AD πβ90Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous toolsβ88Updated 2 years ago
- C2 Automation using Linodeβ85Updated 3 years ago
- Just some random Red Team Scripts that can be usefulβ153Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β105Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Officeβ78Updated last year
- linikatz is a tool to attack AD on UNIXβ153Updated 2 years ago
- Collection of random RedTeam scripts.β208Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β166Updated last year
- Cortex XDR Config Extractorβ135Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementβ181Updated 7 months ago
- Malware As A Serviceβ135Updated last year
- PowerShell Reverse Shellβ79Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"β146Updated last year
- β105Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.β52Updated 3 years ago
- Deploy a phishing infrastructure on the fly.β78Updated last year
- β120Updated 9 months ago
- β52Updated last year
- Easy red team phishing with Puppeteerβ134Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).β93Updated 3 years ago
- A small red team courseβ40Updated 2 years ago
- Utilities for obfuscating shellcodeβ96Updated 3 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.β161Updated 5 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.β97Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automationβ184Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop appsβ144Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine withβ¦β79Updated last year
- A collection of Cobalt Strike Aggressor scripts.β105Updated 3 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy serviceβ76Updated 2 years ago