Adversary Simulation Framework
☆38Aug 19, 2025Updated 6 months ago
Alternatives and similar repositories for ControlSTUDIO
Users that are interested in ControlSTUDIO are comparing it to the libraries listed below
Sorting:
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆24Jan 30, 2026Updated last month
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- ☆18Sep 24, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- 📧 [Research] E-Mail Injection: Vulnerable applications☆17May 26, 2024Updated last year
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 6 months ago
- ☆23Dec 15, 2022Updated 3 years ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆52Dec 9, 2025Updated 2 months ago
- CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using…☆54Dec 10, 2025Updated 2 months ago
- ☆19Oct 23, 2020Updated 5 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Mar 9, 2025Updated 11 months ago
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- ☆27Mar 2, 2022Updated 3 years ago
- Tools for taking over Crestron Windows CE devices☆36Jul 11, 2022Updated 3 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- MSIX Building Made Easy for Defenders☆59Aug 25, 2025Updated 6 months ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- ☆38Mar 28, 2025Updated 11 months ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 2 months ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- Artifact monitoring that ensures fairplay☆78Jan 29, 2025Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 2 months ago
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Sep 23, 2022Updated 3 years ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Sep 21, 2024Updated last year
- Resolve bulk host file list to IP addresses, ASN, and validate DNS.☆39Apr 25, 2025Updated 10 months ago
- Bypass Medium paywalls on mobile. Paste or share a link to read instantly.☆30Feb 9, 2026Updated 2 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 7 months ago
- Supporting the original Team Fortress mod for today's remaining players.☆16Nov 4, 2014Updated 11 years ago