totekuh / red-toolkitLinks
A toolkit for your red team operations
☆34Updated 4 years ago
Alternatives and similar repositories for red-toolkit
Users that are interested in red-toolkit are comparing it to the libraries listed below
Sorting:
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- A collection of tools that I use in CTF's or for assessments☆107Updated 11 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆226Updated 10 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- List of Command&Control (C2) software☆47Updated 3 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- My Favorite Offensive Security Scripts☆82Updated 9 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Updated 2 years ago
- Automated Active Directory lab running on Proxmox☆87Updated 5 months ago
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- a map for the azure oriented pentests☆70Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆216Updated 3 years ago
- ☆37Updated 4 years ago
- ☆65Updated 2 years ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 4 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆130Updated 10 months ago
- sturdy-chainsaw☆69Updated 2 years ago
- Script related in Active Directory Attacks Domain☆24Updated 2 years ago
- ☆76Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Azure Service Subdomain Enumeration☆69Updated last year
- ☆101Updated 4 months ago