psychsecurity / Red-Team-Infrastructure
Tooling and commands for common red team and Infrastructure testing tasks
☆41Updated 2 years ago
Alternatives and similar repositories for Red-Team-Infrastructure:
Users that are interested in Red-Team-Infrastructure are comparing it to the libraries listed below
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆40Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆48Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- ☆55Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆78Updated 3 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 8 months ago
- ☆18Updated 7 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- another nmap summarising script☆25Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆31Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- A proof of concept for delivering webbugs via AWS lambda☆43Updated 6 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆45Updated 7 years ago