A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls
-
Updated
Apr 6, 2018 - Python
A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls
Not another Google searching tool.
Web crawler and scraper based on Scrapy and Playwright's headless browser.
Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
Brute force a JWT token. Script uses multithreading.
Send a payload through TCP.
backdoor that uses dns to communicate
Search Google Dorks like Chad. / Social media takeover tool.
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
Extend wordlist by appending digits and special characters to each word.
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SYSTEM, SECURITY and SAM hives and download them back to the attacker machines.
Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets
Squatm3 is a python tool designed to enumerate available domains generated modifying the original domain name through different techniques
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
DART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolated network environments.
Add a description, image, and links to the red-team-engagement topic page so that developers can more easily learn about it.
To associate your repository with the red-team-engagement topic, visit your repo's landing page and select "manage topics."