Adversary Emulation Framework
-
Updated
Jul 18, 2024 - Go
Adversary Emulation Framework
A Security Tool for Bug Bounty, Pentest and Red Teaming.
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
Go shellcode loader that combines multiple evasion techniques
A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.
A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.
Two in one, patch lifetime powershell console, no more etw and amsi!
Monarch - The Adversary Emulation Toolkit
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷
Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.
directory enumeration tool
Simple C2 via MS Exchange HTTP to evade AV and Network Traffic Restrictions.
Add a description, image, and links to the red-teaming topic page so that developers can more easily learn about it.
To associate your repository with the red-teaming topic, visit your repo's landing page and select "manage topics."