SecuraBV / RedWizardLinks
☆105Updated 2 years ago
Alternatives and similar repositories for RedWizard
Users that are interested in RedWizard are comparing it to the libraries listed below
Sorting:
- ☆154Updated 10 months ago
- Malware As A Service☆137Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Updated last week
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago
- A Red Team Activity Hub☆235Updated this week
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Python utility that generates "imageless" QR codes in various formats☆136Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆146Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆154Updated 2 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ☆166Updated 7 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Easy red team phishing with Puppeteer☆133Updated 3 years ago
- ☆98Updated 3 years ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆184Updated 4 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆126Updated 5 years ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated last year
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- ☆102Updated 4 months ago
- ☆104Updated 2 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆101Updated 3 years ago