HildeTeamTNT / Red-Teaming-ToolkitLinks
☆20Updated 4 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆56Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆167Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- ☆105Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- ☆84Updated 3 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 7 months ago
- ☆85Updated last year
- The most average C2 ever (MACE)☆97Updated 3 years ago
- A collection of Cobalt Strike Aggressor scripts.☆103Updated 3 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆93Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- ⚠️ Malware Development training ⚠️☆38Updated 8 months ago
- A Rust-based dropper for shellcode payloads.☆67Updated 7 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- My Favorite Offensive Security Scripts☆73Updated 6 months ago
- ☆52Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆256Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆42Updated last year