sneakerhax / ContainersLinks
Red Team tools containerized
☆70Updated last week
Alternatives and similar repositories for Containers
Users that are interested in Containers are comparing it to the libraries listed below
Sorting:
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆294Updated last week
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆183Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 7 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆150Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 7 months ago
- ☆61Updated last year
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆95Updated 2 months ago
- The different ways to dump lsass☆195Updated 3 months ago
- Persist like a Dodder☆66Updated 5 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated this week
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 5 months ago
- Vast.ai Password Kracking☆88Updated 3 weeks ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 8 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- Execute shellcode via ASPNET compiler☆58Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆119Updated 10 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆54Updated last month
- sl0ppy-PrivescTaskCreator.ps1☆37Updated last month
- ☆78Updated 6 months ago
- ☆164Updated 6 months ago
- Our Tips&Tricks☆126Updated 8 months ago
- ☆117Updated 5 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆249Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- A community-driven collection of BloodHound queries☆153Updated last month
- Group Policy Objects manipulation and exploitation framework☆269Updated last month
- A Moodle Scanner☆43Updated last year
- Azure Post Exploitation Framework☆241Updated 2 weeks ago