MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (-7.84%)
PezorOpen-Source PE Packer
Stars: ✭ 561 (+33.25%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-88.84%)
anti-honeypot一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
Stars: ✭ 38 (-90.97%)
gitoopsall paths lead to clouds
Stars: ✭ 579 (+37.53%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-36.34%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-21.85%)
brutasWordlists and passwords handcrafted with ♥
Stars: ✭ 32 (-92.4%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-91.21%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+100.48%)
AvsignseekTool written in python3 to determine where the AV signature is located in a binary/payload
Stars: ✭ 284 (-32.54%)
DiscordGoDiscord C2 for Redteam....Need a better name
Stars: ✭ 55 (-86.94%)
TtpsTactics, Techniques, and Procedures
Stars: ✭ 335 (-20.43%)
Behold3r👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (-93.11%)
MicrosoftWontFixListA list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Stars: ✭ 854 (+102.85%)
fileless-elf-execExecute ELF files without dropping them on disk
Stars: ✭ 237 (-43.71%)
OffensiveCloudDistributionLeverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Stars: ✭ 86 (-79.57%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-88.6%)
NxcryptNXcrypt - 'python backdoor' framework
Stars: ✭ 316 (-24.94%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-94.77%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+29.22%)
fofa viewer一个简单实用的FOFA客户端 By flashine
Stars: ✭ 815 (+93.59%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-90.97%)
AggressorScriptsA collection of Cobalt Strike aggressor scripts
Stars: ✭ 18 (-95.72%)
FatherLD_PRELOAD rootkit
Stars: ✭ 59 (-85.99%)
Cobalt strike extension kitAttempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Stars: ✭ 345 (-18.05%)
linkedinscraperLinkedinScraper is an another information gathering tool written in python. You can scrape employees of companies on Linkedin.com and then create these employee names, titles and emails.
Stars: ✭ 22 (-94.77%)
LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 3,810 (+804.99%)
redpillAssist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (-66.27%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-9.26%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-38.72%)
certexfilExfiltration based on custom X509 certificates
Stars: ✭ 18 (-95.72%)
Redteam ResearchCollection of PoC and offensive techniques used by the BlackArrow Red Team
Stars: ✭ 330 (-21.62%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (-52.49%)
BadAssMacrosBadAssMacros - C# based automated Malicous Macro Generator.
Stars: ✭ 281 (-33.25%)
sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (-87.65%)
0xsp Mongoosea unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (-0.48%)
tridentautomated password spraying tool
Stars: ✭ 133 (-68.41%)
ShellyAutomatic Reverse Shell Generator
Stars: ✭ 38 (-90.97%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-91.45%)
KnockOutlookA little tool to play with Outlook
Stars: ✭ 188 (-55.34%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-79.1%)
ReverseShellDllC++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
Stars: ✭ 69 (-83.61%)
Pidense🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Stars: ✭ 358 (-14.96%)
RedBook基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (-86.7%)
RedTeamOne line PS scripts that may come handy during your network assesment
Stars: ✭ 56 (-86.7%)
adduser-dllSimple DLL that add a user to the local Administrators group
Stars: ✭ 48 (-88.6%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (-28.5%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-92.64%)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (-38.72%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (-0.48%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-8.08%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (-15.68%)