nickvangilder / most-average-c2-everLinks
The most average C2 ever (MACE)
☆97Updated 3 years ago
Alternatives and similar repositories for most-average-c2-ever
Users that are interested in most-average-c2-ever are comparing it to the libraries listed below
Sorting:
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Collection of random RedTeam scripts.☆207Updated last year
- Cortex XDR Config Extractor☆135Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆151Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆165Updated last year
- ☆105Updated 2 years ago
- Malware As A Service☆135Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆79Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- ☆52Updated last year
- Rust in-memory dumper☆108Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated 11 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated 4 months ago
- Artifact monitoring that ensures fairplay☆78Updated 10 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- ☆161Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- ☆84Updated 3 years ago
- A collection of Cobalt Strike Aggressor scripts.☆106Updated 3 years ago