This tool uses Ansible to work. To install Ansible, look at the installation guide.
These tools are very usefull for pentesting, CTF and red-teaming.
This project was originally inspired by: https://github.com/archcloudlabs/kali-up/
Launch installation of the whole packages:
ansible-playbook launch.yml
You can install only parts of the tools by using Ansible tags:
ansible-playbook launch.yml --tags "network"
Different tags are:
- system
- c2
- reverse
- windows
- linux
- network
- wiki
The C2 Matrix includes lot of tools well known but also propose a laboratory to try these tools.
List of installed tools:
- apfell
- caldera
- covenant
- empire
- ibombshell
- koadic
- merlin
- nuages
- powerhub
- silenttrinity
- sliver
- trevorc2
- poshc2
- BloodHound
- BloodHound.py
- CrackMapExec
- unicorn
- [evil-(winrm]https://github.com/Hackplayers/evil-winrm.git)
- PowerSploit
- KeeThief
- Seatbelt
- SharpUp
- SafetyKatz
- SharpDump
- SharpWMI
- Rubeus
- SharpDPAPI
- Lockless
- SharpRoast
- PSAmsi
- Limelighter
- nishang
- kerbrute
- ActiveReign
- powercat
- SysinternalsSuite
- mimikatz_trunk