Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
-
Updated
Nov 2, 2020 - PowerShell
{{ message }}
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
A collection of open source and commercial tools that aid in red team operations.
Remote Administration Tool for Windows
An Information Security Reference That Doesn't Suck
Wiki to collect Red Team infrastructure hardening resources
Scalable Automated Adversary Emulation Platform
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Covenant is a collaborative .NET C2 framework for red teamers.
Implant framework
Leak git repositories from misconfigured websites
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
The all-in-one Red Team extension for Web Pentester
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Homemade Pwnbox
The Shadow Attack Framework
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
Aggressor scripts for use with Cobalt Strike 3.0+
A front-end JavaScript toolkit for creating DNS rebinding attacks.
DNS Rebinding Exploitation Framework
A Golang implant that uses Slack as a command and control server
DeimosC2 is a Golang command and control framework for post-exploitation.
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
(l)user hunter using WinAPI calls only
The SpecterOps project management and reporting engine
Python 3.5+ DNS asynchronous brute force utility
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."
Unit tests need to be created that tests obfuscating with all possible Mutator permutations that are 2 Mutators long. So basically given the dozen or so current Mutators, make sure Mutators don't just work on their separately, but together as well. I've run into a few random cases where using Mutators in specific combinations produces faulty payloads, and want a test that can do this for me.
Us