securethelogs / RedRabbit
Red Team PowerShell Script
☆330Updated last year
Alternatives and similar repositories for RedRabbit:
Users that are interested in RedRabbit are comparing it to the libraries listed below
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆290Updated 3 years ago
- Network Pivoting Toolkit☆440Updated last year
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆368Updated 2 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆486Updated 11 months ago
- Python3 tool to perform password spraying using RDP☆641Updated last year
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆313Updated 3 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆362Updated last year
- The Shadow Attack Framework☆1,097Updated 2 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆299Updated 8 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Updated 4 years ago
- Open source C2 server created for stealth red team operations☆797Updated 2 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆579Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆732Updated 8 months ago
- Python script wrote to automate the process of generating various reverse shells.☆199Updated 3 years ago
- PowerShell scripts for communicating with a remote host.☆302Updated last year
- Various PowerShell scripts that may be useful during red team exercise☆941Updated 2 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,116Updated 2 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆283Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆760Updated 4 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆214Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- A repository of tools for pentesting of restricted and isolated environments.☆555Updated 3 years ago
- Zero Infrastructure Password Cracking☆399Updated 5 months ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆683Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆312Updated last year
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆224Updated 3 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆516Updated last year
- An script to perform kerberos bruteforcing by using impacket☆445Updated 2 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆334Updated this week
- Password Hunter in Active Directory☆197Updated 2 years ago