ferreirasc / redteam-arsenalLinks
Some binaries/scripts that may be useful in red team/pentest exercises
☆22Updated last month
Alternatives and similar repositories for redteam-arsenal
Users that are interested in redteam-arsenal are comparing it to the libraries listed below
Sorting:
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- offensive notes & resources☆43Updated 7 months ago
- This repo will contain some basic pentest/RT commands.☆37Updated 3 years ago
- ☆37Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 11 months ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆47Updated 3 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆36Updated 2 years ago
- A little cheatsheet for NetExec☆30Updated last year
- ☆26Updated 3 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆99Updated last year
- Creates and sends fake meeting invite☆71Updated 4 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- A web shell for pivoting and lateral movement☆34Updated 8 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆16Updated last year
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆19Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- C# tool to discover low hanging fruits☆96Updated 2 years ago
- ☆42Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Notification webhook for GoPhish☆57Updated last year
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆38Updated 2 years ago