Adversary Emulation Framework
-
Updated
Sep 23, 2024 - Go
Adversary Emulation Framework
A Security Tool for Bug Bounty, Pentest and Red Teaming.
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
Go shellcode loader that combines multiple evasion techniques
A command-line utility designed to help you discover subdomains for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.
Two in one, patch lifetime powershell console, no more etw and amsi!
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷
Monarch - The Adversary Emulation Toolkit
Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.
directory enumeration tool
Simple C2 via MS Exchange HTTP to evade AV and Network Traffic Restrictions.
Add a description, image, and links to the red-teaming topic page so that developers can more easily learn about it.
To associate your repository with the red-teaming topic, visit your repo's landing page and select "manage topics."