Slides and Codes used for the workshop Red Team Infrastructure Automation
☆194Apr 14, 2024Updated 2 years ago
Alternatives and similar repositories for HSC24RedTeamInfra
Users that are interested in HSC24RedTeamInfra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆551Jun 3, 2025Updated 10 months ago
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- Bash and ZSH integration for Impacket☆72Nov 6, 2025Updated 5 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆702May 7, 2025Updated 11 months ago
- ☆124May 12, 2021Updated 4 years ago
- A Red Team Activity Hub☆235Updated this week
- AV/EDR Lab environment setup references to help in Malware development☆466Feb 19, 2025Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆210Sep 30, 2024Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆302Jan 20, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Aug 15, 2024Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆204Mar 26, 2025Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆138Jul 23, 2024Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆279Jun 15, 2024Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆906Updated this week
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆348Nov 19, 2024Updated last year
- ☆64Jan 2, 2024Updated 2 years ago
- An offensive data enrichment pipeline☆949Apr 2, 2026Updated last week
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆327May 17, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ☆108Oct 29, 2024Updated last year
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆545May 9, 2025Updated 11 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆149May 23, 2024Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- ☆336Sep 21, 2025Updated 6 months ago
- Initial Access and Post-Exploitation Tool for Entra ID and M365 with a browser-based GUI☆1,247Dec 31, 2025Updated 3 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆439Jun 27, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆751May 23, 2025Updated 10 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆591Jun 12, 2024Updated last year
- ☆65Mar 15, 2024Updated 2 years ago
- ☆165May 5, 2025Updated 11 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year