praetorian-inc / slack-c2bot
Slack C2bot that executes commands and returns the output.
☆45Updated last year
Alternatives and similar repositories for slack-c2bot:
Users that are interested in slack-c2bot are comparing it to the libraries listed below
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- ☆55Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- ☆47Updated 4 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- Continuous kerberoast monitor☆44Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 3 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- IcedID Decryption Tool☆28Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- ☆38Updated 6 years ago
- A Golang implant that uses Slack as a command and control server☆46Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆88Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆70Updated last year
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆71Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago