Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for red team attacker
attacker
x
red-team
x
3 search results found
Bigbountyrecon
⭐
471
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Dns Rebind Toolkit
⭐
447
A front-end JavaScript toolkit for creating DNS rebinding attacks.
Credsleaker
⭐
251
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Nac_bypass
⭐
220
Script collection to bypass Network Access Control (NAC, 802.1x)
Remote Desktop Caching
⭐
155
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Infosec Interview Questions
⭐
111
🗒️ A [work-in-progress] collection for interview questions for Information Security roles
Cloudcopy
⭐
46
This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapshot permission.
Piuser
⭐
25
👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡
Pooroperationalsecuritypractices
⭐
12
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
Waterline
⭐
9
Waterline Documentation
Related Searches
Python Attacker (365)
Attack Attacker (278)
1-3 of 3 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.