Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
-
Updated
Mar 26, 2022 - PowerShell
{{ message }}
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Remote Administration Tool for Windows
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Automated Adversary Emulation Platform
The all-in-one Red Team extension for Web Pentester
Adversary Emulation Framework
Wiki to collect Red Team infrastructure hardening resources
Gather and update all available and newest CVEs with their PoC.
Covenant is a collaborative .NET C2 framework for red teamers.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Kscan是一款纯go开发的全方位扫描器,具备端口扫描、协议检测、指纹识别,暴力破解等功能。支持协议1200+,协议指纹10000+,应用指纹2000+,暴力破解协议10余种。
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
hello,作者老哥你好啊。我之前就注意到了这个项目,感觉做得很不错!很高兴能看到有这种支持一键反弹和管理的软件,我之前也提到感觉这个软件的web后台管理系统略有不足,也看见作者老哥最近有更新管理系统UI和添加认证功能的计划,因为我最近刚忙了一轮工作,在自学beego+vue3的过程中,希望可以参与到这个项目中来,一起完善这个项目,我看了一下代码,应该是用gin+react写的,估计是不需要我用beego再写一遍了,不过我觉得我可以用vue参与前端开发吗?另外我对后渗透等内容也很感兴趣,以前也有参与过metasploit模块的编写,不过当时的内容是行业强相关的,和TCP/IP的协议关系不大,等我后面有空了再去渗透组偷偷师,希望也能参与这个功能的开发。老哥可以留个微信交流交流吗?
Homemade Pwnbox
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
Unit tests need to be created that tests obfuscating with all possible Mutator permutations that are 2 Mutators long. So basically given the dozen or so current Mutators, make sure Mutators don't just work on their separately, but together as well. I've run into a few random cases where using Mutators in specific combinations produces faulty payloads, and want a test that can do this for me.
Us
Describe the bug
dotnet executable
When compiling the cs files needed for the encoders, the CSC compiler complains and stops the process.
[-] Error: temp\tmpg84fw_q7.cs(26,16777214): error CS1034: Compiler limit exceeded: Line cannot exceed 16777214 characters
To Reproduce
This happens when passing a binary (in my case ~4MB) into inceptor.
Expected behavior
working
The Shadow Attack Framework
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
C2/post-exploitation framework
🐱💻
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."
It would be awesome to have an ARM version of gitjacker built right into the precompiled binaries section of the releases. As more and more computers make the move to ARM, I believe it would be beneficial to have an ARM release. I want to contribute, but am not sure how to compile it for ARM.