Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and other post-exploitation tools.
☆178Nov 10, 2022Updated 3 years ago
Alternatives and similar repositories for zuthaka
Users that are interested in zuthaka are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆264Apr 24, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆285Oct 29, 2024Updated last year
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- Discord as a C2☆49Jan 4, 2021Updated 5 years ago
- A C2 post-exploitation framework☆486Jan 24, 2024Updated 2 years ago
- A little tool to play with Outlook☆206Nov 11, 2021Updated 4 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Jun 10, 2022Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆720Aug 17, 2021Updated 4 years ago
- UUID based Shellcode loader for your favorite C2☆86Dec 8, 2021Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Aug 1, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆270Mar 18, 2021Updated 5 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆230Jul 30, 2020Updated 5 years ago
- Extendable payload obfuscation and delivery framework☆146Nov 4, 2022Updated 3 years ago
- Open source pre-operation C2 server based on python and powershell☆765Jul 6, 2021Updated 4 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Jun 11, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆463Jul 15, 2022Updated 3 years ago
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆483Jul 12, 2023Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆227Feb 9, 2021Updated 5 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆382Mar 8, 2023Updated 3 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆502Oct 8, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆186Jul 21, 2022Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆145May 1, 2021Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago