Shell-Company / Noirgate
NoirGate provides on-demand ephemeral anonymous shells secured by TOTP
☆31Updated 4 months ago
Related projects: ⓘ
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆14Updated 2 years ago
- Continuous kerberoast monitor☆43Updated last year
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 2 years ago
- ☆42Updated 2 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆23Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- ☆36Updated this week
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆20Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆28Updated 4 months ago
- ☆18Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆46Updated 6 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Public repository for Red Canary Research☆33Updated 3 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 6 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆43Updated this week
- List of Red Team Resources☆17Updated 4 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆15Updated 3 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆34Updated 4 months ago
- Can you pay the ransom in your country?☆13Updated 9 months ago
- Stupid Simple Detection Testing☆11Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- WMI SA stuffs☆28Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery tools☆14Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- C# User Simulation☆33Updated last year
- Exfiltration based on custom X509 certificates☆25Updated 6 months ago