redlure / redlure-console
Distributed phishing framework designed to streamline offensive security phishing
☆39Updated last year
Alternatives and similar repositories for redlure-console:
Users that are interested in redlure-console are comparing it to the libraries listed below
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆32Updated last year
- Notification webhook for GoPhish☆52Updated 7 months ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Updated last year
- ☆31Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 9 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆52Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- ☆24Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 4 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Microsoft365 Device Code Phishing Framework☆35Updated 3 years ago
- Ansible role that Installs Mythic☆14Updated 7 months ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago