RedSiege / Egress-Assess
Egress-Assess is a tool used to test egress data detection capabilities
☆650Updated last year
Alternatives and similar repositories for Egress-Assess
Users that are interested in Egress-Assess are comparing it to the libraries listed below
Sorting:
- Malicious WMI Events using PowerShell☆384Updated 8 years ago
- Search for categorized domain☆444Updated 6 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆447Updated 7 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆406Updated last year
- PowerShell Remote Download Cradle Generator & Obfuscator☆837Updated 7 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆366Updated 9 months ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆378Updated 5 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆277Updated 9 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆632Updated 7 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆813Updated 10 months ago
- The Old BloodHound C# Ingestor (Deprecated)☆511Updated 2 years ago
- ☆520Updated 2 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆575Updated 10 years ago
- Active Directory ACL exploitation with BloodHound☆724Updated 3 years ago
- Domain Password Audit Tool for Pentesters☆955Updated 2 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449Updated 2 years ago
- Responder Windows Version Beta☆524Updated 9 months ago
- Chameleon: A tool for evading Proxy categorisation☆491Updated 5 months ago
- Search for potential frontable domains☆625Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,126Updated 4 years ago
- ☆394Updated 4 years ago
- Active Directory forensic framework☆324Updated 3 years ago
- A PowerShell module to deploy active directory decoy objects.☆228Updated 5 years ago
- ☆282Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆316Updated 5 years ago
- NTLMv1 Multitool☆614Updated 3 weeks ago
- Exchange privilege escalations to Active Directory☆762Updated 2 years ago
- Not PowerShell☆446Updated 8 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,520Updated 6 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,060Updated 5 years ago