Slides and Codes used for the workshop Red Team Infrastructure Automation
☆193Apr 14, 2024Updated last year
Alternatives and similar repositories for HSC24RedTeamInfra
Users that are interested in HSC24RedTeamInfra are comparing it to the libraries listed below
Sorting:
- Abusing Azure services over C2☆367Jan 20, 2026Updated last month
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆542Jun 3, 2025Updated 9 months ago
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆323May 17, 2024Updated last year
- A Red Team Activity Hub☆234Feb 25, 2026Updated last week
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆701May 7, 2025Updated 9 months ago
- Bash and ZSH integration for Impacket☆73Nov 6, 2025Updated 3 months ago
- AV/EDR Lab environment setup references to help in Malware development☆426Feb 19, 2025Updated last year
- ☆124May 12, 2021Updated 4 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated 11 months ago
- Impacket is a collection of Python classes for working with network protocols.☆302Jan 20, 2026Updated last month
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆122May 29, 2024Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆138Jul 23, 2024Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Apr 22, 2024Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆283Jun 15, 2024Updated last year
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,033Dec 31, 2025Updated 2 months ago
- An offensive data enrichment pipeline☆924Updated this week
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated 2 weeks ago
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆539May 9, 2025Updated 9 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Aug 15, 2024Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆209Sep 30, 2024Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148May 23, 2024Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆215Oct 19, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆748May 23, 2025Updated 9 months ago
- ☆334Sep 21, 2025Updated 5 months ago
- ☆108Aug 21, 2024Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Red Team Attack Lab for TTP testing & research☆595May 15, 2023Updated 2 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆436Jun 27, 2025Updated 8 months ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆389Apr 3, 2024Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago