HildeTeamTNT / Red-Teaming-ToolkitLinks
☆20Updated 4 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- ☆84Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- ☆105Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- ☆41Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 7 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- ☆85Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- My Favorite Offensive Security Scripts☆73Updated 5 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- ☆42Updated 9 months ago
- A collection of Cobalt Strike Aggressor scripts.☆103Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆166Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆17Updated 2 years ago
- ⚠️ Malware Development training ⚠️☆37Updated 7 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Just my findings of malwares☆43Updated 3 years ago
- Windows priviledge escalation script☆12Updated 8 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- ☆93Updated 7 months ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago