tcostam / awesome-command-control
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.
☆837Updated 4 years ago
Alternatives and similar repositories for awesome-command-control:
Users that are interested in awesome-command-control are comparing it to the libraries listed below
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆710Updated 2 months ago
- ☆1,039Updated 10 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,146Updated 2 months ago
- Windows Local Privilege Escalation Cookbook☆1,087Updated 2 months ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,866Updated 4 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆981Updated 8 months ago
- Starkiller is a Frontend for PowerShell Empire.☆1,437Updated last week
- The Hunt for Malicious Strings☆1,185Updated 2 years ago
- Red Team Cheatsheet in constant expansion.☆1,171Updated last year
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,483Updated 3 years ago
- Penelope Shell Handler☆875Updated 2 weeks ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,797Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,363Updated 2 weeks ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,171Updated 10 months ago
- This project is aimed at freely providing technical guides on various hacking topics.☆827Updated this week
- PowerShell Ransomware Simulator with C2 Server☆477Updated last year
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,225Updated this week
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,899Updated last month
- This map lists the essential techniques to bypass anti-virus and EDR☆2,750Updated last week
- A light-weight first-stage C2 implant written in Nim (and Rust).☆865Updated last week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,108Updated 10 months ago
- ☆706Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,943Updated last month
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,300Updated last month
- evilginx3 + gophish☆1,753Updated 9 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,642Updated 5 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆522Updated last year
- Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)☆361Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆3,535Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,775Updated 10 months ago