AzureC2Relay
AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.
Shad0w is a post-exploitation framework designed to operate covertly on heavily monitored environments, allowing users to perform various tasks without being detected. It provides a range of features and tools to help users navigate and control compromised systems, making it an essential tool for penetration testers and red teamers. With its ability to operate covertly, Shad0w is particularly useful in environments with strict security controls, allowing users to gather information, escalate privileges, and move laterally without being detected.
AzureC2Relay enhances security by validating and relaying Cobalt Strike beacon traffic through Azure Functions.
Create a vulnerable active directory for testing various Active Directory attacks.
A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.
Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.
Generates shellcode that loads Windows payloads from memory and runs them with parameters.
Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.