qsecure-labs / overlordLinks
Overlord - Red Teaming Infrastructure Automation
☆626Updated last year
Alternatives and similar repositories for overlord
Users that are interested in overlord are comparing it to the libraries listed below
Sorting:
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆821Updated last month
- gather gather gather☆583Updated 9 months ago
- Open source pre-operation C2 server based on python and powershell☆759Updated 4 years ago
- An Office365 User Attack Tool☆645Updated last year
- Kerberoast attack -pure python-☆434Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆501Updated 3 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆343Updated 7 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆754Updated last year
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆522Updated 3 years ago
- Disposable and resilient red team infrastructure with Terraform☆280Updated 6 years ago
- A toolkit to attack Office365☆1,112Updated 5 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆703Updated 5 years ago
- An script to perform kerberos bruteforcing by using impacket☆455Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆755Updated 4 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,143Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,544Updated 3 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated last year
- ☆334Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆759Updated last year
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆832Updated 2 months ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆385Updated 5 years ago
- Hide your payload in DNS☆618Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Updated 2 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆964Updated last year
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆381Updated last year
- Red Team C2 Infrastructure built in AWS using Ansible!☆231Updated 5 years ago
- Network Pivoting Toolkit☆457Updated 2 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆738Updated 5 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆544Updated 4 months ago