bvcyber / RedWizardLinks
☆106Updated 2 years ago
Alternatives and similar repositories for RedWizard
Users that are interested in RedWizard are comparing it to the libraries listed below
Sorting:
- ☆154Updated 10 months ago
- Malware As A Service☆137Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Updated last week
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆117Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- A Red Team Activity Hub☆235Updated this week
- linikatz is a tool to attack AD on UNIX☆155Updated 2 years ago
- ☆166Updated 7 months ago
- ☆184Updated last year
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆273Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Updated 6 months ago
- Azure AD cheatsheet for the CARTP course☆146Updated 3 years ago
- ☆104Updated 2 months ago
- ☆102Updated 5 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated last year
- Ping-based Information Lookup and Outbound Transfer☆80Updated last year
- ☆42Updated last year
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Updated last year
- pysnaffler☆110Updated last month