-
Updated
Aug 8, 2020 - PowerShell
#
red-team
Here are 149 public repositories matching this topic...
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
security
powershell
hacking
activedirectory
penetration-testing
infosec
powershell-script
red-team
nishang
redteam
A collection of open source and commercial tools that aid in red team operations.
-
Updated
May 25, 2020
Remote Administration Tool for Windows
windows
c-sharp
security
remote-control
administration
protobuf
dotnet
mono
remote
rat
net
remote-desktop
red-team
-
Updated
Aug 25, 2020 - C#
An Information Security Reference That Doesn't Suck
windows
linux
osx
reverse-engineering
hacking
forensics
penetration-testing
infosec
pentesting
references
information-security
privilege-escalation
exfiltration
infosec-reference
red-team
blueteam
hacking-simulator
privilege-escalation-exploits
mitre-attack-db
-
Updated
Aug 25, 2020
Wiki to collect Red Team infrastructure hardening resources
-
Updated
Mar 24, 2020
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
bash
osint
nmap
penetration-testing
recon
scanning
kali-linux
red-team
information-gathering
metasploit
payload-generator
reconnaissance
-
Updated
Aug 23, 2020 - Shell
Automated Adversary Emulation
mitre
red-team
security-automation
security-testing
mitre-attack
adversary-emulation
caldera
mitre-corporation
-
Updated
Aug 25, 2020 - Python
Implant framework
golang
http
dns-server
red-team
security-tools
c2
red-team-engagement
command-and-control
implant
red-teaming
-
Updated
Aug 18, 2020 - Go
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
security
cryptography
privacy
cipher
hacking
steganography
infosec
pentesting
pentest
hacking-tool
exfiltration
red-team
dlp
data-exfiltration
security-tools
av-evasion
pentest-tool
stego
hacking-tools
pentest-tools
-
Updated
May 27, 2020 - Python
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
-
Updated
Aug 12, 2020 - C#
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
-
Updated
Nov 29, 2018 - PowerShell
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
security
automation
hacking
infosec
pentesting
pentest
hacking-tool
red-team
security-tools
pentest-tool
blue-team
hacking-tools
red-teams
blue-teams
pentest-tools
-
Updated
May 27, 2020 - Python
capnspacehook
commented
Jan 15, 2019
Unit tests need to be created that tests obfuscating with all possible Mutator permutations that are 2 Mutators long. So basically given the dozen or so current Mutators, make sure Mutators don't just work on their separately, but together as well. I've run into a few random cases where using Mutators in specific combinations produces faulty payloads, and want a test that can do this for me.
Us
The Shadow Attack Framework
-
Updated
Aug 17, 2020 - PowerShell
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
-
Updated
Jun 11, 2018 - JavaScript
-
Updated
Jul 2, 2020 - Go
Aggressor scripts for use with Cobalt Strike 3.0+
-
Updated
May 30, 2018
A front-end JavaScript toolkit for creating DNS rebinding attacks.
-
Updated
Jun 19, 2018 - JavaScript
DNS Rebinding Exploitation Framework
iot
hacking
pentesting
iot-security
red-team
web-hacking
iot-security-testing
dns-rebinding
browser-hacking
-
Updated
Oct 27, 2019 - JavaScript
A Golang implant that uses Slack as a command and control server
python
golang
penetration-testing
pentest
red-team
remote-admin-tool
c2
command-and-control
penetration-testing-tools
-
Updated
Oct 10, 2019 - Python
(l)user hunter using WinAPI calls only
-
Updated
Dec 3, 2016 - C++
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
security
cryptography
hacking
steganography
pentesting
exfiltration
red-team
dlp
data-exfiltration
security-tools
pentest-tool
hacking-tools
-
Updated
May 27, 2020 - Python
An Android app that lets you use your access control card cloning devices in the field.
-
Updated
Jul 27, 2019 - Java
Python 3.5+ DNS asynchronous brute force utility
python
resolver
dns
security
osint
async
subdomain
enumeration
brute-force
pentesting
recon
red-team
security-tools
bruteforcing
osint-resources
subdomain-takeover
subdomin-enumeration
-
Updated
Apr 15, 2020 - Python
The SpecterOps project management and reporting engine
-
Updated
Aug 25, 2020 - Python
Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on
-
Updated
Jan 22, 2019 - PowerShell
Improve this page
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."


Bug
Describe the feature request or bug
When i launch BypassUACGrunt command with a launcher (for example, BypassUACGrunt PowerShell), Covenant prints a error that you can see in the screeshot. This error it's with last github master branch. PowerShell launcher is generated.
Screenshots
![image](https://user-images.githubusercontent.com/2709307/85056566-b3a3e300-b19f-11ea-8