Stars
Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** across 15 modules for range lifecycle management, scenario depl…
Implemented a project silo for BloodHound CE to ensure we can have project based deployments
sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux
Third iteration of Lamperl, a Linux agent for the Adaptix C2 being developed for a blog post.
Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.
Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.
The fastest knowledge base for growing teams. Beautiful, realtime collaborative, feature packed, and markdown compatible.
SauronEye is an @Adaptix-Framework post-exploitation BOF tool for searching directories and file contents for specific keywords discreetly.
PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.
Agent for AdaptixC2 containing lateral movement capabilities ( WMI, SCM, WinRM, DCOM ), bof/dotnet/shellcode in memory executions, postex modules with shellcode and bof with possibilities of fork e…
Simulation and red team Phishing Framework
Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence
A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily
Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.
Parseltongue 3.1 - LLM Payload Crafter for AI safety research
Lateral Movement Bof with MSI ODBC Driver Install
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its minimalist, robust, and highly adaptable architecture, this solu…
Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and comprehensive network discovery. Export results as BloodHound‑…
An agentic workflow tool that provides context engineering support for opencode
AI agent framework for plan-first development workflows with approval-based execution. Multi-language support (TypeScript, Python, Go, Rust) with automatic testing, code review, and validation buil…
Bring your AI to life—talk to assistants instantly in your browser. Zero hassle, No API keys, No Whisper
IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare
The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.