connormcgarr / Red-Team-Automation-ScriptsLinks
Scripts to help automate tedious red teaming enumeration and tasks.
☆17Updated 5 years ago
Alternatives and similar repositories for Red-Team-Automation-Scripts
Users that are interested in Red-Team-Automation-Scripts are comparing it to the libraries listed below
Sorting:
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- ☆16Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆19Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- ☆12Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- ☆14Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- ☆17Updated 5 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- ☆17Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- pwncat windows c2 components☆19Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- ☆18Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Simple C2 over the Trello API☆38Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago