t3ntman / Red-Team-Scripts
Collection of scripts that I have used on Red Team engagements
☆14Updated 6 years ago
Related projects: ⓘ
- Useful Windows and AD tools☆15Updated 2 years ago
- Gmail Knocker☆21Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 5 months ago
- Random code snippets☆9Updated 10 months ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆13Updated 7 years ago
- ☆17Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆15Updated 5 years ago
- ☆24Updated 6 years ago
- ☆30Updated 6 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆11Updated 7 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Side Channel script☆25Updated last year
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- AV Bypass☆28Updated 6 years ago
- Miscellaneous for various things☆21Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- ☆11Updated 8 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆18Updated 5 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated last year
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 7 years ago
- ☆13Updated this week
- Identify common attack paths to get Domain Administrator☆21Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- ☆16Updated 6 years ago