A quick and dirty sliver docker container
-
Updated
Oct 4, 2022 - Dockerfile
A quick and dirty sliver docker container
A collection of red team tools that I've developed for personal use
A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls
Automatic deployment of red team infrastructure. Basically a less fleshed out version of warhorse or Redcloud!
Not another Google searching tool.
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
Brute force subdomains in multiple smaller iterations. Based on DNSRecon.
List unquoted service paths and start, stop, or restart services as needed.
Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.
WarBerryPi - Tactical Exploitation
Web crawler and scraper based on Scrapy and Playwright's headless browser.
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
Dump a process memory and extract data based on regular expressions.
Brute force a JWT token. Script uses multithreading.
Aerial platform for Recon, Intelligence and Pentesting. #R-KALI #Porunga
ARM 32-bit Raspberry Pi Hacking Char example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Float example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.
ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.
Send a payload through TCP.
Add a description, image, and links to the red-team-engagement topic page so that developers can more easily learn about it.
To associate your repository with the red-team-engagement topic, visit your repo's landing page and select "manage topics."