The Rogue Access Point Framework
-
Updated
Aug 16, 2020 - Python
{{ message }}
The Rogue Access Point Framework
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
List of Awesome Red Teaming Resources
Red Teaming Tactics and Techniques
Utilities for MITRE™ ATT&CK
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
A PowerShell script anti-virus evasion tool
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
PowerShell rebuilt in C# for Red Teaming purposes
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Python tool that monitors and logs user-run commands on a Linux system for either offensive or defensive purposes..
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Passwords Recovery Tool
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
Disposable and resilient red team infrastructure with Terraform
A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems
A tool to help query AD via the LDAP protocol
Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.
A collection of data exfiltration scripts for Red Team assessments.
Open Source - Common Findings DataBase (JSON & MD)
Add a description, image, and links to the redteaming topic page so that developers can more easily learn about it.
To associate your repository with the redteaming topic, visit your repo's landing page and select "manage topics."