SecuraBV / RedWizardLinks
☆105Updated last year
Alternatives and similar repositories for RedWizard
Users that are interested in RedWizard are comparing it to the libraries listed below
Sorting:
- Malware As A Service☆135Updated last year
- ☆148Updated 4 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- ☆95Updated 3 months ago
- ☆179Updated 8 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 3 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆179Updated last year
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆244Updated last year
- User Enumeration of Microsoft Teams users via API☆163Updated last year
- pysnaffler☆102Updated last month
- A Red Team Activity Hub☆221Updated 2 weeks ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆93Updated last year
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆130Updated 3 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆89Updated 3 years ago
- C2 Automation using Linode☆83Updated 2 years ago
- ☆155Updated 2 months ago
- ☆206Updated 2 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆132Updated 6 months ago
- Roast in the Middle☆292Updated 9 months ago
- Living off the land searches for explorer and sharepoint☆89Updated 3 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last month
- Python utility that generates "imageless" QR codes in various formats☆125Updated last year