op7ic / RT-CyberShieldLinks
Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges
☆46Updated 3 years ago
Alternatives and similar repositories for RT-CyberShield
Users that are interested in RT-CyberShield are comparing it to the libraries listed below
Sorting:
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆86Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 7 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 5 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- DeepSea Phishing Gear☆123Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 10 months ago
- ☆56Updated 5 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 8 years ago
- Tool for password spraying RDP☆97Updated 6 years ago
- Machine Learning Network Share Password Hunting Toolkit☆128Updated 5 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- An Ansible role for installing Cobalt Strike.☆80Updated last month
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆107Updated 6 years ago