zarkones / ControlSTUDIOLinks
Adversary Simulation Framework
☆38Updated 4 months ago
Alternatives and similar repositories for ControlSTUDIO
Users that are interested in ControlSTUDIO are comparing it to the libraries listed below
Sorting:
- Templates for developing your own listeners and agents for AdaptixC2.☆41Updated last week
- Docker container for running CobaltStrike 4.10☆37Updated last year
- ☆38Updated 9 months ago
- ☆43Updated last year
- Deobfuscation of XorStringsNet☆14Updated last year
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 4 months ago
- ☆26Updated 10 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Updated 9 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Updated last month
- Malware traffic obfuscation library☆39Updated 5 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆44Updated 2 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 9 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 6 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆111Updated last month
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆23Updated 2 weeks ago
- ☆59Updated last year
- ☆59Updated last year
- Validates priv escalation of AD trusts☆48Updated 9 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆90Updated 11 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆33Updated 2 months ago
- ☆53Updated this week
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆42Updated 3 months ago