pucarasec / zuthaka
Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and other post-exploitation tools.
☆176Updated 2 years ago
Alternatives and similar repositories for zuthaka:
Users that are interested in zuthaka are comparing it to the libraries listed below
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆172Updated 5 months ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆211Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆147Updated last year
- ☆362Updated 6 months ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆214Updated 4 years ago
- SpecterOps Presentations☆185Updated 3 months ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- Load any Beacon Object File using Powershell!☆245Updated 3 years ago
- ☆161Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆112Updated 2 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆141Updated last month
- ☆72Updated 2 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆156Updated 3 weeks ago
- Basic C2 Server☆186Updated 3 years ago
- Emulate and Dissect MSF and *other* attacks☆141Updated 11 months ago
- ☆189Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆169Updated this week
- Red Team C2 Infrastructure built in AWS using Ansible!☆225Updated 4 years ago
- ☆94Updated 4 months ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆207Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆272Updated 3 months ago
- A little tool to play with Outlook☆205Updated 3 years ago
- ☆291Updated 7 months ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆157Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆200Updated last month
- ☆115Updated 3 years ago