dsnezhkov / racketeerLinks
☆69Updated 3 years ago
Alternatives and similar repositories for racketeer
Users that are interested in racketeer are comparing it to the libraries listed below
Sorting:
- TA505+ Adversary Simulation☆65Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- ☆20Updated 4 years ago
- ☆80Updated 5 years ago
- A repo to support the book☆108Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- ☆70Updated last year
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 2 weeks ago
- Fraktal's Ransomware Emulator☆102Updated last year
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆82Updated 2 weeks ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- ☆108Updated 3 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆86Updated 9 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- This script is a multi-threaded Okta password sprayer.☆72Updated last year
- ☆100Updated 10 months ago
- ☆48Updated 8 months ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- ☆117Updated 4 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- Microsoft Azure Exploitation Framework☆57Updated 4 years ago
- Protocol agnostic online password guessing API.☆84Updated 2 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago