Adversary Emulation Framework
-
Updated
Jun 18, 2024 - Go
Adversary Emulation Framework
A Security Tool for Bug Bounty, Pentest and Red Teaming.
A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.
advanced Telegram x Discord C2, great for Data Exfitration and Network evasion 🔷
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.
Monarch - The Adversary Emulation Toolkit
Go shellcode loader that combines multiple evasion techniques
Simple C2 via MS Exchange HTTP to evade AV and Network Traffic Restrictions.
Add a description, image, and links to the red-teaming topic page so that developers can more easily learn about it.
To associate your repository with the red-teaming topic, visit your repo's landing page and select "manage topics."