pucarasec / zuthaka
Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and other post-exploitation tools.
☆174Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for zuthaka
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆210Updated 3 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆207Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆268Updated 3 weeks ago
- Emulate and Dissect MSF and *other* attacks☆139Updated 8 months ago
- More examples using the Impacket library designed for learning purposes.☆262Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆231Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆149Updated last year
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆127Updated last year
- Office 365 and Exchange Enumeration☆182Updated 5 years ago
- ☆189Updated 4 years ago
- ☆354Updated 3 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆140Updated 3 weeks ago
- ☆180Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆372Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆253Updated 2 years ago
- Collection of cyphers for bloodhound☆143Updated 4 months ago
- Enumerate Domain Data☆316Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆321Updated 2 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆425Updated 2 years ago
- ☆111Updated 3 years ago
- ☆161Updated last year
- ☆92Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆221Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆216Updated 2 years ago
- ☆202Updated this week
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆92Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆104Updated 2 years ago
- ☆290Updated 4 months ago
- Basic C2 Server☆183Updated 3 years ago