Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Projects in Awesome Lists tagged with red-teams
A curated list of projects in awesome lists tagged with red-teams .
https://github.com/byt3bl33d3r/silenttrinity
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
boolang c-sharp dotnet dotnet-dlr dotnet-script ironpython post-exploitation python3 red-teams security-tools
Last synced: 30 Sep 2024
https://github.com/byt3bl33d3r/SILENTTRINITY
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
boolang c-sharp dotnet dotnet-dlr dotnet-script ironpython post-exploitation python3 red-teams security-tools
Last synced: 31 Jul 2024
https://github.com/byt3bl33d3r/sprayingtoolkit
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
lync o365 owa password-spraying password-spraying-attacks pentesting python3 red-teams security security-tools skype-for-business
Last synced: 26 Sep 2024
https://github.com/byt3bl33d3r/SprayingToolkit
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
lync o365 owa password-spraying password-spraying-attacks pentesting python3 red-teams security security-tools skype-for-business
Last synced: 04 Aug 2024
https://github.com/cyberark/kubesploit
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
agent c2 command-and-control containers golang http2 kubernetes penetration-testing-framework penetration-testing-tools post-exploitation red-teams redteam-tools security security-tools
Last synced: 26 Sep 2024
https://github.com/TryCatchHCF/DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
automation blue-team blue-teams hacking hacking-tool hacking-tools infosec pentest pentest-tool pentest-tools pentesting red-team red-teams security security-tools
Last synced: 31 Jul 2024
https://github.com/coalfire-research/red-baron
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.
infrastructure-as-code red-teams security security-tools terraform terraform-module
Last synced: 29 Sep 2024
https://github.com/byt3bl33d3r/offensivedlr
Toolbox containing research notes & PoC code for weaponizing .NET's DLR
boolang c-sharp clr dlr dotnet ironpython powershell red-teams security-tools
Last synced: 03 Oct 2024
https://github.com/byt3bl33d3r/red-baron
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams
infrastructure infrastructure-as-code red-teams security security-tools terraform terraform-modules
Last synced: 26 Sep 2024
https://github.com/blackbotsecurity/Atomic-Red-Team-Intelligence-C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
csharp dotnet mitre-attack offensive-security post-exploitation powershell-scripts purple-team purpleteam python3 red-teams redteam
Last synced: 04 Aug 2024
https://github.com/paulveillard/cybersecurity-red-team
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
blue-team cybersecurity penetration-resistance-modeling penetration-testing red-team red-teaming red-teams security-tools security-vulnerability-assessment technical-analysis threat-intelligence threat-modeling
Last synced: 03 Aug 2024