In this hacking scenario, students on 2 teams defend and attack a vulnerable server, database, and website.
-
Updated
Apr 27, 2015 - C
In this hacking scenario, students on 2 teams defend and attack a vulnerable server, database, and website.
Public Toolkit - https://mikeabreu.github.io/public-toolkit/
Pineapple telegram bot
From @securesean Malware101 course for Red Teamers at BSides 2018
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely u…
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Linux Automated Security scanning Tool
Disposable and resilient red team infrastructure with Terraform
This is a simple project that is using the vulnerability of trust on HID device. The ducky script or the arduinoscript basically dowloads the passviewer executable and runs it in background then mails the output to the given mail and also adds the file to the windows registery that makes it semi persistent.....
A lean and quick method for automatically deploying Empire using terraform
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems
edge --> powerpoint --> remote-file --> shell
C# Csharp OutCompressedDLL. C# version of Out-CompressedDll.ps1 from PowerSploit.
Docker build for wifiphisher https://github.com/wifiphisher/wifiphisher
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
A script to automate the creation of cloud infrastructure for hash cracking.
Raw syscall implementations with Powershell
Add a description, image, and links to the redteaming topic page so that developers can more easily learn about it.
To associate your repository with the redteaming topic, visit your repo's landing page and select "manage topics."