RoseSecurity / WolfPackLinks
WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.
☆148Updated 4 months ago
Alternatives and similar repositories for WolfPack
Users that are interested in WolfPack are comparing it to the libraries listed below
Sorting:
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆103Updated last week
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆151Updated 9 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆69Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 11 months ago
- A Red Team Activity Hub☆222Updated this week
- ☆106Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- ☆86Updated 2 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆245Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆77Updated 8 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆93Updated last month
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 3 years ago
- https://lolad-project.github.io/☆81Updated 9 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆46Updated 2 weeks ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆89Updated 3 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- Artifact monitoring that ensures fairplay☆78Updated 8 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆122Updated 2 years ago
- ☆46Updated last year
- Automated Active Directory lab running on Proxmox☆85Updated last month
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆146Updated 2 months ago