RedTeamOperations
A Realistic Adversary Simulation Lab provider for Offensive & Defensive Team members :) #redteam #cyberwarfarelabs #cyberwarfare #blueteam #cloudsecurity
CW Labs Pvt. Ltd.United Kingdom
Pinned Repositories
Advanced-Process-Injection-Workshop
Detecting-Adversarial-Tradecrafts-Tools-by-leveraging-ETW
CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"
GCPTokenReuse
GoogleWorkspaceDirectoryDump
Journey-to-McAfee
PivotSuite
Network Pivoting Toolkit
Red-Infra-Craft
RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advanced phishing & payload infras
RedCloud-OS
RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)
VEH-PoC
Vulnerable_Machine
This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.
RedTeamOperations's Repositories
RedTeamOperations/Advanced-Process-Injection-Workshop
RedTeamOperations/RedCloud-OS
RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)
RedTeamOperations/PivotSuite
Network Pivoting Toolkit
RedTeamOperations/Journey-to-McAfee
RedTeamOperations/VEH-PoC
RedTeamOperations/Red-Infra-Craft
RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advanced phishing & payload infras
RedTeamOperations/Detecting-Adversarial-Tradecrafts-Tools-by-leveraging-ETW
CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"
RedTeamOperations/GCPTokenReuse
RedTeamOperations/GoogleWorkspaceDirectoryDump
RedTeamOperations/APTSimulator
A toolset to make a system look as if it was the victim of an APT attack
RedTeamOperations/RedTeam
Tools & Interesting Things for RedTeam Ops
RedTeamOperations/shad0w
A post exploitation framework designed to operate covertly on heavily monitored enviroments
RedTeamOperations/Apfell
A collaborative, multi-platform, red teaming framework
RedTeamOperations/cwl-blackfriday-offers
RedTeamOperations/fuzzing
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
RedTeamOperations/macro_pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
RedTeamOperations/evil-winrm
The ultimate WinRM shell for hacking/pentesting
RedTeamOperations/krbrelayx
Kerberos unconstrained delegation abuse toolkit
RedTeamOperations/nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
RedTeamOperations/Stormspotter
Azure Red Team tool for graphing Azure and Azure Active Directory objects
RedTeamOperations/CursedChrome
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
RedTeamOperations/donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
RedTeamOperations/GCP-Threat-Research-Matrix
RedTeamOperations/misc
RedTeamOperations/SkyArk
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
RedTeamOperations/UserSimulation
RedTeamOperations/Amass
In-depth Attack Surface Mapping and Asset Discovery
RedTeamOperations/cwl-multicloud-vm-metadata
RedTeamOperations/GAM
command line management for Google Workspace
RedTeamOperations/reGeorg
The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.