Adversary Emulation Framework
-
Updated
Nov 25, 2024 - Go
Adversary Emulation Framework
Work in progress...
Collection of PowerShell functions a Red Teamer may use in an engagement
PHP shells that work on Linux OS, macOS, and Windows OS.
Work in progress...
Work in progress...
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.
Penetration testing utility and antivirus assessment tool.
Work in progress...
PowerShell scripts for communicating with a remote host.
DART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolated network environments.
Bypass 4xx HTTP response status codes and more. Based on PycURL and Python Requests.
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Learn how to set up a fake authentication web page on a fake WiFi network.
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Windows OS keylogger with a hook mechanism (i.e. with a keyboard hook procedure).
Monarch - The Adversary Emulation Toolkit
JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
Simple API for storing all incoming XSS requests and various XSS templates.
Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets
Add a description, image, and links to the red-team-engagement topic page so that developers can more easily learn about it.
To associate your repository with the red-team-engagement topic, visit your repo's landing page and select "manage topics."