redcode-labs / RedSandLinks
Hackable Windows SandBox environment
☆32Updated 2 years ago
Alternatives and similar repositories for RedSand
Users that are interested in RedSand are comparing it to the libraries listed below
Sorting:
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- A python package that helps with analysis of MSI files☆14Updated 4 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆19Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Obtain and parse SSL certificates☆87Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Local Privilege Escalation Miner☆29Updated 3 years ago
- Registry hive parsing the async way☆21Updated 6 months ago
- Evtx Log (xml) Browser☆55Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- Detect and remove the presence of canary tokens☆23Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 4 years ago
- ☆19Updated 4 years ago
- Bloodhound Portable for Windows☆52Updated 2 years ago
- ☆54Updated 9 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆72Updated 2 years ago
- ☆12Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 6 months ago
- ☆14Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- AutoPoC Generator HoneyPoC☆35Updated 5 months ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Updated 7 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆48Updated 5 months ago