sneakerhax / ContainersLinks
Red Team tools containerized
☆74Updated 2 months ago
Alternatives and similar repositories for Containers
Users that are interested in Containers are comparing it to the libraries listed below
Sorting:
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆220Updated last month
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆92Updated this week
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆90Updated 2 months ago
- Network Fuzzing Framework☆60Updated 3 weeks ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Updated 10 months ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆152Updated this week
- ☆55Updated 2 months ago
- ☆63Updated last month
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆124Updated last month
- PoC that downloads an executable from a public SSL certificate☆136Updated 6 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆121Updated 5 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆276Updated 3 weeks ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆68Updated this week
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Updated 2 months ago
- ☆163Updated 2 months ago
- Execute shellcode via ASPNET compiler☆60Updated 4 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆79Updated 2 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆268Updated last month
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- Vast.ai Password Kracking☆92Updated 3 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 10 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆162Updated 3 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆89Updated 6 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆68Updated 3 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 7 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago