Pickfordmatt / ApfellLinks
A collaborative, multi-platform, red teaming framework
☆14Updated 5 years ago
Alternatives and similar repositories for Apfell
Users that are interested in Apfell are comparing it to the libraries listed below
Sorting:
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- ☆42Updated 7 months ago
- ☆80Updated 2 years ago
- Escaping Restricted Environments and Bypassing DLP☆76Updated 6 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Notification webhook for GoPhish☆57Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 11 months ago
- Local Privilege Escalation Miner☆29Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- ☆54Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Bloodhound Portable for Windows☆53Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ☆67Updated 2 years ago