ashirt-ops / ashirt-serverLinks
Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit
☆164Updated this week
Alternatives and similar repositories for ashirt-server
Users that are interested in ashirt-server are comparing it to the libraries listed below
Sorting:
- It records your screenshots and code, then lets you upload to ASHIRT☆55Updated 4 months ago
- ☆114Updated 2 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- ☄️ go-out - A Golang egress buster.☆128Updated last year
- ☆137Updated 2 years ago
- ☆116Updated 4 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- This script is a multi-threaded Okta password sprayer.☆71Updated last year
- A Docker container for remote penetration testing.☆135Updated 4 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated last year
- User enumeration with Microsoft Teams API☆172Updated 3 years ago
- A repo to support the book☆108Updated 3 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- easy-to-use payload hosting☆270Updated 3 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆215Updated 2 years ago
- ☆150Updated last year
- automated password spraying tool☆148Updated 4 years ago
- Burp with Friends☆103Updated 2 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆168Updated 7 months ago
- ☆94Updated 2 years ago
- Resolves an IP address to the cloud provider it is hosted on☆95Updated this week
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 3 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- Tools and blogs I use to perform GCP red teams☆118Updated 11 months ago
- List of Repositories☆98Updated 3 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆335Updated 6 years ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆117Updated last year
- ☆53Updated 6 years ago