redcode-labs / RedSandLinks
Hackable Windows SandBox environment
☆31Updated 2 years ago
Alternatives and similar repositories for RedSand
Users that are interested in RedSand are comparing it to the libraries listed below
Sorting:
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- A python package that helps with analysis of MSI files☆14Updated 4 years ago
- A collection of my presentation materials.☆17Updated last year
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- ☆14Updated 2 years ago
- ☆17Updated 10 months ago
- ☆11Updated 4 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Gadget IoC removal from HAK5's BashBunny☆19Updated last year
- Evtx Log (xml) Browser☆56Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 11 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Exfiltrate data from a compromised target using covert channels☆16Updated 4 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆37Updated 2 months ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- ☆23Updated 3 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 8 months ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Updated 4 months ago
- ☆12Updated 4 years ago
- wordlists for password cracking☆28Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13Updated last month