RedSiege / Egress-Assess
Egress-Assess is a tool used to test egress data detection capabilities
☆632Updated last year
Alternatives and similar repositories for Egress-Assess:
Users that are interested in Egress-Assess are comparing it to the libraries listed below
- Malicious WMI Events using PowerShell☆379Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆631Updated 7 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆437Updated 7 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆401Updated last year
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆567Updated 10 years ago
- Search for categorized domain☆443Updated 6 years ago
- Domain Password Audit Tool for Pentesters☆939Updated 2 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆825Updated 6 years ago
- Active Directory ACL exploitation with BloodHound☆713Updated 3 years ago
- ☆281Updated 7 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆510Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆226Updated 5 years ago
- Active Directory forensic framework☆323Updated 2 years ago
- ☆517Updated 2 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆365Updated 6 months ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆811Updated 7 months ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆382Updated 7 months ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆451Updated 8 years ago
- Chameleon: A tool for evading Proxy categorisation☆477Updated 2 months ago
- Weaponizing Splunk with reverse and bind shells.☆176Updated 7 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆256Updated 6 months ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆377Updated 4 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆446Updated 2 years ago
- ☆391Updated 4 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆283Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆312Updated 4 years ago
- Responder Windows Version Beta☆514Updated 6 months ago
- Powershell C2 Server and Implants☆574Updated 5 years ago
- Credential and Red Teaming Defense for Windows Environments☆324Updated 6 months ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆395Updated 11 months ago