gmatuz / npm-initial-access
Easy to extend initial access scenario to help with EDR testing on Linux and Mac
☆23Updated 2 years ago
Related projects: ⓘ
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆65Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆44Updated 3 years ago
- ☆39Updated this week
- Zoom Persistence Aggressor and Handler☆53Updated 3 years ago
- ☆50Updated last year
- Continuous kerberoast monitor☆43Updated last year
- C# User Simulation☆33Updated last year
- ☆15Updated 2 years ago
- A list of IOCs applicable to PoshC2☆23Updated 4 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆29Updated last year
- Spin up RedTeam infrastructure on AWS via Ansible☆58Updated 4 years ago
- ☆41Updated 2 years ago
- This repo is dedicated to a powerpoint exploit☆33Updated 3 years ago
- ☆51Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- ☆37Updated 2 years ago
- ☆13Updated 8 months ago
- ☆12Updated this week
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆73Updated last month
- wordlists for password cracking☆25Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆46Updated 6 months ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- Repository for LNK stuff☆27Updated 2 years ago
- ☆10Updated last year
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆13Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago