Boot-to-Breach red team lab on AWS. Mythic, Sliver, and Havoc C2 behind a production-style Apache redirector. Deployed via Terraform, to be used for training/self hosted environments.
☆220May 2, 2026Updated this week
Alternatives and similar repositories for redStack
Users that are interested in redStack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notion C2 Profile for Mythic☆45Updated this week
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 8 months ago
- kerberos in rust for fun and profit☆73Mar 13, 2026Updated last month
- Better version of SharpPick☆14Aug 29, 2025Updated 8 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆152Dec 6, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Fast context enumeration for newly obtained Active Directory credentials.☆87Apr 17, 2026Updated 2 weeks ago
- Atomic test units for BOF execution☆55Apr 26, 2026Updated last week
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated 3 weeks ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 25, 2026Updated last week
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28Feb 18, 2026Updated 2 months ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆45Nov 22, 2025Updated 5 months ago
- A persistent database + CLI for your BBOT scan data 🧡☆44Updated this week
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆563Oct 3, 2025Updated 7 months ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆105Apr 4, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- All Security Engineering Resources☆15Feb 2, 2018Updated 8 years ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆46Aug 10, 2025Updated 8 months ago
- A Crystal Palace shared library to resolve & perform syscalls☆61Oct 29, 2025Updated 6 months ago
- ☆28Mar 14, 2026Updated last month
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆70Feb 17, 2026Updated 2 months ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆26Apr 25, 2026Updated last week
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 6 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Token impersonation in PowerShell to execute under the context of another user.☆25Oct 14, 2025Updated 6 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆83Mar 24, 2026Updated last month
- SCEP request tool for AD CS and Intune☆76Oct 24, 2025Updated 6 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated 3 months ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆140Apr 26, 2026Updated last week
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 11 months ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 7 months ago
- The Azure Execution Tool☆155Feb 6, 2026Updated 3 months ago
- Active Directory Firewall☆103Feb 25, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆83Nov 6, 2025Updated 6 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆184May 19, 2025Updated 11 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- ☆139Nov 17, 2025Updated 5 months ago
- ProxyWatch☆48Apr 25, 2026Updated last week
- Adversary Emulation Framework☆130Jul 1, 2025Updated 10 months ago