redcode-labs / RedMarkLinks
Our fork of Iceman's fork for Proxmark III
☆17Updated 11 months ago
Alternatives and similar repositories for RedMark
Users that are interested in RedMark are comparing it to the libraries listed below
Sorting:
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last month
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 3 years ago
- ☆11Updated 4 years ago
- wordlists for password cracking☆28Updated 3 years ago
- wsnet☆27Updated last month
- Golang Shlyuz Implant Implementation☆13Updated 5 months ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 3 years ago
- ☆18Updated 5 years ago
- Force target victim to unsafe network☆29Updated 5 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
- Hackable Windows SandBox environment☆32Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- ☆12Updated 3 years ago
- Seven different DLL injection techniques in one single project.☆13Updated 5 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Top hashpwn rules☆21Updated 11 months ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 5 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year