SecuraBV / RedWizardLinks
☆104Updated last year
Alternatives and similar repositories for RedWizard
Users that are interested in RedWizard are comparing it to the libraries listed below
Sorting:
- ☆146Updated 3 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆175Updated last year
- Malware As A Service☆134Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated last year
- A Red Team Activity Hub☆214Updated this week
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆200Updated 2 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 9 months ago
- The most average C2 ever (MACE)☆96Updated 3 years ago
- ☆179Updated 7 months ago
- pysnaffler☆101Updated 3 months ago
- Cortex XDR Config Extractor☆132Updated 2 years ago
- ☆148Updated 3 weeks ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 7 months ago
- C2 Automation using Linode☆82Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated 11 months ago
- Living off the land searches for explorer and sharepoint☆89Updated 2 months ago
- ☆95Updated last month
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆113Updated last year
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆152Updated 2 months ago
- Automated exploitation of MSSQL servers at scale☆109Updated 3 weeks ago
- Parses Snaffler output file and generate beautified outputs.☆104Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆198Updated 3 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- Efflanrs - GUI for Snaffler Output☆26Updated 10 months ago
- Identifies the bytes that Microsoft Defender flags on.☆89Updated 3 years ago
- Azure AD cheatsheet for the CARTP course☆122Updated 3 years ago