splunk / ShellSweep
ShellSweeping the evil.
☆134Updated last month
Related projects: ⓘ
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆91Updated 3 weeks ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆245Updated last year
- Everything and anything related to password spraying☆122Updated 3 months ago
- PowerShell Script Analyzer☆64Updated 10 months ago
- A Slack bot phishing framework for Red Teaming exercises☆150Updated 4 months ago
- ☆51Updated this week
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆239Updated last year
- C2 Automation using Linode☆78Updated last year
- An interactive shell to spoof some LOLBins command line☆179Updated 7 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆259Updated 11 months ago
- ☆34Updated 5 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆128Updated 4 months ago
- Easy red team phishing with Puppeteer☆127Updated last year
- A Red Team Activity Hub☆168Updated 3 weeks ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆146Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆169Updated 5 months ago
- ☆139Updated 6 months ago
- Azure mindmap for penetration tests☆157Updated 9 months ago
- Different methods to get current username without using whoami☆170Updated 7 months ago
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆119Updated last month
- A collection of tools and detections for the Sliver C2 Frameworj☆104Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆129Updated 10 months ago
- ☆181Updated 7 months ago
- Continuous password spraying tool☆112Updated 3 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆85Updated 6 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆226Updated 6 months ago
- Some of my rough notes for Docker threat detection☆46Updated last year