safebuffer / redblockLinks
RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to easily block all IPs associated with hosting and cloud infrastructure, as well as known sandbox environments.
☆23Updated last year
Alternatives and similar repositories for redblock
Users that are interested in redblock are comparing it to the libraries listed below
Sorting:
- Passworld is a fully customizable wordlist generator☆16Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Cobalt Strike BOFS☆16Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated last month
- ☆29Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 6 months ago
- Automatically deploy Nemesis☆21Updated last year
- ☆22Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- ☆27Updated 4 years ago
- ☆17Updated 11 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- ☆15Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Updated 2 weeks ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 9 months ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Updated 3 years ago
- ☆19Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 10 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago