Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

Projects in Awesome Lists tagged with red-teams

A curated list of projects in awesome lists tagged with red-teams .

https://github.com/byt3bl33d3r/silenttrinity

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

boolang c-sharp dotnet dotnet-dlr dotnet-script ironpython post-exploitation python3 red-teams security-tools

Last synced: 30 Sep 2024

https://github.com/byt3bl33d3r/SILENTTRINITY

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

boolang c-sharp dotnet dotnet-dlr dotnet-script ironpython post-exploitation python3 red-teams security-tools

Last synced: 31 Jul 2024

https://github.com/byt3bl33d3r/sprayingtoolkit

Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient

lync o365 owa password-spraying password-spraying-attacks pentesting python3 red-teams security security-tools skype-for-business

Last synced: 26 Sep 2024

https://github.com/byt3bl33d3r/SprayingToolkit

Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient

lync o365 owa password-spraying password-spraying-attacks pentesting python3 red-teams security security-tools skype-for-business

Last synced: 04 Aug 2024

https://github.com/cyberark/kubesploit

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

agent c2 command-and-control containers golang http2 kubernetes penetration-testing-framework penetration-testing-tools post-exploitation red-teams redteam-tools security security-tools

Last synced: 26 Sep 2024

https://github.com/TryCatchHCF/DumpsterFire

"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.

automation blue-team blue-teams hacking hacking-tool hacking-tools infosec pentest pentest-tool pentest-tools pentesting red-team red-teams security security-tools

Last synced: 31 Jul 2024

https://github.com/coalfire-research/red-baron

Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.

infrastructure-as-code red-teams security security-tools terraform terraform-module

Last synced: 29 Sep 2024

https://github.com/byt3bl33d3r/offensivedlr

Toolbox containing research notes & PoC code for weaponizing .NET's DLR

boolang c-sharp clr dlr dotnet ironpython powershell red-teams security-tools

Last synced: 03 Oct 2024

https://github.com/byt3bl33d3r/red-baron

Automate creating resilient, disposable, secure and agile infrastructure for Red Teams

infrastructure infrastructure-as-code red-teams security security-tools terraform terraform-modules

Last synced: 26 Sep 2024

https://github.com/blackbotsecurity/Atomic-Red-Team-Intelligence-C2

ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.

csharp dotnet mitre-attack offensive-security post-exploitation powershell-scripts purple-team purpleteam python3 red-teams redteam

Last synced: 04 Aug 2024

https://github.com/paulveillard/cybersecurity-red-team

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.

blue-team cybersecurity penetration-resistance-modeling penetration-testing red-team red-teaming red-teams security-tools security-vulnerability-assessment technical-analysis threat-intelligence threat-modeling

Last synced: 03 Aug 2024