tonghuaroot / Awesome-macOS-Red-TeamingLinks
List of Awesome macOS Red Teaming Resources.
☆239Updated 3 years ago
Alternatives and similar repositories for Awesome-macOS-Red-Teaming
Users that are interested in Awesome-macOS-Red-Teaming are comparing it to the libraries listed below
Sorting:
- macOS Initial Access Payload Generator☆318Updated last year
- ☆412Updated last year
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆242Updated 3 months ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 3 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆280Updated 2 years ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- Phishing Framework for Pentesters☆199Updated 2 years ago
- Red Teaming / Pentesting challenges for my Advent-Of-Code 2021.☆104Updated 3 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆214Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- ☆347Updated 2 years ago
- CyberSec Blog☆97Updated 3 weeks ago
- More examples using the Impacket library designed for learning purposes.☆266Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆201Updated 4 years ago
- ☆413Updated 3 years ago
- Convert shellcode into different formats!☆359Updated 2 years ago
- Proof-of-concept tools for my AD Forest trust research☆228Updated last year
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆436Updated 10 months ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆386Updated 3 years ago
- Impersonating authentication over HTTP and/or named pipes.☆139Updated 4 years ago
- This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations o…☆43Updated last year
- Windows for Red Teamers☆126Updated 3 years ago
- The Official Sliver Armory☆118Updated 7 months ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆336Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆403Updated 10 months ago
- ☆408Updated 5 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆447Updated 2 years ago
- AV Evasion Techniques☆80Updated 3 years ago