khast3x / RedcloudLinks
Automated Red Team Infrastructure deployement using Docker
☆1,261Updated 3 years ago
Alternatives and similar repositories for Redcloud
Users that are interested in Redcloud are comparing it to the libraries listed below
Sorting:
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,550Updated 3 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,143Updated last year
- Overlord - Red Teaming Infrastructure Automation☆628Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Updated 5 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,783Updated 3 years ago
- fully automated pentesting tool☆518Updated 3 years ago
- Red Team Tool Kit☆1,133Updated 3 years ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆765Updated 3 years ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆1,054Updated last year
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆704Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆756Updated last year
- The Shadow Attack Framework☆1,117Updated 3 years ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,398Updated last year
- A toolkit to attack Office365☆1,113Updated 5 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,069Updated last year
- gather gather gather☆584Updated 10 months ago
- pwning IPv4 via IPv6☆1,881Updated last year
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆604Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,749Updated last month
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Updated 2 months ago
- Mass scan IPs for vulnerable services☆1,045Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,463Updated 10 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,086Updated 2 months ago
- Extract credentials from lsass remotely☆2,175Updated last month
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,183Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆759Updated last year
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,306Updated 4 years ago
- PowerShell ReverseTCP Shell - Framework☆1,063Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,524Updated last month
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆544Updated 5 months ago