nickvangilder / most-average-c2-everLinks
The most average C2 ever (MACE)
☆97Updated 3 years ago
Alternatives and similar repositories for most-average-c2-ever
Users that are interested in most-average-c2-ever are comparing it to the libraries listed below
Sorting:
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆153Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- ☆105Updated 2 years ago
- Collection of random RedTeam scripts.☆211Updated last year
- Living off the land searches for explorer and sharepoint☆92Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Easy red team phishing with Puppeteer☆133Updated 2 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆106Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆94Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆180Updated 8 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated 6 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- ☆165Updated last year
- Malware As A Service☆136Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆134Updated 11 months ago
- ☆120Updated 9 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago