SecuraBV / RedWizardLinks
☆105Updated 2 years ago
Alternatives and similar repositories for RedWizard
Users that are interested in RedWizard are comparing it to the libraries listed below
Sorting:
- ☆153Updated 8 months ago
- Malware As A Service☆136Updated last year
- A Red Team Activity Hub☆225Updated 3 weeks ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆216Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆161Updated 11 months ago
- ☆182Updated 11 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆179Updated 2 months ago
- ☆163Updated 5 months ago
- Azure AD cheatsheet for the CARTP course☆137Updated 3 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆79Updated 2 years ago
- User Enumeration of Microsoft Teams users via API☆177Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆95Updated 3 years ago
- ☆99Updated 2 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆267Updated last year
- using graph proxy to monitor teams user presence☆54Updated last year
- Python utility that generates "imageless" QR codes in various formats☆131Updated last year
- ☆227Updated 5 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆136Updated 10 months ago
- ☆99Updated 3 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year