HildeTeamTNT / Red-Teaming-ToolkitLinks
☆20Updated 5 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆56Updated last week
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 8 months ago
- ☆84Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- ☆106Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- ☆52Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆105Updated 3 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 9 months ago
- ☆42Updated last year
- The most average C2 ever (MACE)☆97Updated 3 years ago
- My Favorite Offensive Security Scripts☆78Updated 7 months ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 3 weeks ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆109Updated last year
- ☆87Updated last year
- Just my findings of malwares☆43Updated 3 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆94Updated 2 weeks ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆46Updated last year
- ☆101Updated 10 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 7 months ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago