Compare commits
3 Commits
b7c45ec8b2
...
287105c06a
Author | SHA1 | Date |
---|---|---|
pe3zx | 287105c06a | |
pe3zx | 4f95675c9e | |
pe3zx | e6a8016f4c |
|
@ -2727,6 +2727,10 @@ Some tools can be categorized in more than one category. But because the current
|
|||
<td><a href="https://github.com/Dliv3/DomainBorrowing">Dliv3/DomainBorrowing</a></td>
|
||||
<td>Domain Borrowing is a new method to hide your C2 traffic with CDN</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/DragoQCC/HardHatC2">DragoQCC/HardHatC2</a></td>
|
||||
<td>A C# Command & Control framework</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/echtdefault/C2-GUI-Template">echtdefault/C2-GUI-Template</a></td>
|
||||
<td>Template for a C2 GUI coded in C++ using Win32 API</td>
|
||||
|
|
|
@ -193,6 +193,10 @@ This repository is created as an online bookmark for useful links, resources and
|
|||
<td><a href="https://github.com/redhuntlabs/RedHunt-OS">redhuntlabs/RedHunt-OS</a></td>
|
||||
<td>Virtual Machine for Adversary Emulation and Threat Hunting</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/RedTeamOperations/RedCloud-OS">RedTeamOperations/RedCloud-OS</a></td>
|
||||
<td>RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/nickzer0/RedLab">nickzer0/RedLab</a></td>
|
||||
<td>Files for red team lab infrastructure.</td>
|
||||
|
@ -3549,6 +3553,10 @@ This repository is created as an online bookmark for useful links, resources and
|
|||
<td><a href="https://github.com/muraenateam/muraena">muraenateam/muraena</a></td>
|
||||
<td>Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/Octoberfest7/TeamsPhisher">Octoberfest7/TeamPhisher</a></td>
|
||||
<td>Send phishing messages and attachments to Microsoft Teams users</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="https://github.com/optiv/Microsoft365_devicePhish">optiv/Microsoft365_devicePhish</a></td>
|
||||
<td>A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow</td>
|
||||
|
|
Loading…
Reference in New Issue