blackhatethicalhacking / Redcloud
Comfy & powerful Red Team Infrastructure deployement using Docker
☆13Updated 5 years ago
Alternatives and similar repositories for Redcloud:
Users that are interested in Redcloud are comparing it to the libraries listed below
- A Tool for Domain Flyovers☆18Updated 5 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆81Updated 2 months ago
- The New Hacking Framework☆18Updated 7 years ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated 2 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- ☆77Updated 5 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 4 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆40Updated 4 years ago
- Nessus Parser☆55Updated 7 years ago
- Tool that automates Active Directory enumeration☆89Updated 3 years ago
- ☆16Updated 7 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 4 years ago
- Automated Penetration Testing Framework☆35Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- Passive internal reconnaissance tool☆67Updated 2 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- ☆20Updated 5 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated 6 months ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 5 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Updated 6 years ago