ZephrFish / Red-Teaming-ToolkitLinks
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
☆11Updated 3 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- Purple Team Workshop by @jorgeorchilles☆11Updated 4 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆14Updated 6 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- ☆29Updated 2 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆37Updated last year
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- ☆16Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Various scripts and codes☆84Updated 4 years ago
- ☆24Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 3 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆59Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Creates and sends fake meeting invite☆69Updated 4 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year