Ne0nd0g / Red-Teaming-ToolkitLinks
A collection of open source and commercial tools that aid in red team operations.
☆13Updated 7 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- Sp00fer blog post -☆24Updated 3 years ago
- ☆24Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- ☆19Updated 5 years ago
- Red Team C2 and Post Exploitation code☆34Updated 5 months ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Finding SSL Blindspots for Red Teams☆34Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆63Updated 7 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Random code snippets☆11Updated 2 years ago
- Penetration Test / Read Team - C# tools repository☆55Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- Subdomain Enumeration and Scanner☆34Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Spin up a reverse proxy quickly on Heroku☆15Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 3 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 7 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago