RedTeamOperations / Red-Infra-Craft
RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advanced phishing & payload infras
☆141Updated last month
Alternatives and similar repositories for Red-Infra-Craft:
Users that are interested in Red-Infra-Craft are comparing it to the libraries listed below
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆217Updated 2 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆146Updated 3 weeks ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆103Updated last month
- ☆47Updated last week
- Continuous password spraying tool☆183Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 6 months ago
- ☆83Updated 2 months ago
- Everything and anything related to password spraying☆134Updated 11 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆101Updated 6 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆211Updated last month
- A cheatsheet for NetExec☆119Updated 3 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆168Updated 10 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆145Updated 5 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆154Updated 3 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆115Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆128Updated last year
- Azure Post Exploitation Framework☆197Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 3 months ago
- C2 Infrastructure Automation☆98Updated last month
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆128Updated last month
- ☆164Updated 3 weeks ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆153Updated 6 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆183Updated 8 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆182Updated this week
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆162Updated last week
- Parses Snaffler output file and generate beautified outputs.☆95Updated 3 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 10 months ago
- ☆143Updated last month
- linikatz is a tool to attack AD on UNIX☆146Updated last year
- Generate and Manage KeyCredentialLinks☆156Updated 3 weeks ago