praetorian-inc / slack-c2botLinks
Slack C2bot that executes commands and returns the output.
☆46Updated 2 years ago
Alternatives and similar repositories for slack-c2bot
Users that are interested in slack-c2bot are comparing it to the libraries listed below
Sorting:
- ☆48Updated 5 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆62Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- ☆60Updated 5 years ago
- ☆56Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆78Updated 3 weeks ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- In motherland, target network calls you!☆60Updated 6 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- IcedID Decryption Tool☆28Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- ☆52Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 2 years ago