Krypton C2 is a simple botnet source. Credits Source Code: NixWasHere
Kylebot | This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.
The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.
A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.
Please visit the Wiki for up-to-date information
Advanced tunneling/pivoting tool that creates a VPN-like tunnel from the agent to the operator without SOCKS proxies. Enables direct routing…
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Scripted local Linux enumeration and privilege escalation checks. Collects system information, user data, SUID/SGID binaries, sudo configura…
A collection of links related to Linux kernel security and exploitation
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
Living Off The Land Binaries And Scripts — documents Windows native binaries that can be abused for execution, download, bypass, and persist…
lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
IoM implant, C2 Framework and Infrastructure
Next Generation C2 Framework, IoM-server/client
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Adaptix C2 agent using Crystal Palace PIC linker and PICO module system
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
The world's most widely used penetration testing framework. Provides hundreds of exploit modules, payloads, encoders, and post-exploitation …
Metasploit's advanced, dynamically extensible payload. Runs entirely in memory, supports migration, keylogging, screenshot capture, pivoting…
Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...
Post-exploitation tool to extract plaintexts passwords, hashes, PIN codes, and Kerberos tickets from memory. Also performs Pass-the-Hash, Pa…