unusualwork / red-team-toolsView external linksLinks
☆54Oct 26, 2018Updated 7 years ago
Alternatives and similar repositories for red-team-tools
Users that are interested in red-team-tools are comparing it to the libraries listed below
Sorting:
- ☆19Jan 23, 2020Updated 6 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- C++ DLL Bootstrapper for spinning up the CLR for C# Payloads☆44Mar 6, 2019Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 5 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Practical examples and simulations developed at GNURadio☆17Feb 15, 2021Updated 4 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆123Jul 7, 2023Updated 2 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 6 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆52Apr 16, 2020Updated 5 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Desktop app that crawls urls from Google's search engine results☆17Mar 5, 2024Updated last year
- Repo for reverse engineering the Hantek 6254BD USB-connected oscilloscope☆14Jul 21, 2019Updated 6 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆15Mar 20, 2013Updated 12 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- ☆110May 14, 2018Updated 7 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- [OLD] Terraform provider plugin for Linode Cloud resources.. See☆15Oct 18, 2018Updated 7 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Jun 10, 2022Updated 3 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago