Pinned Repositories
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
BadOutlook
(kinda) Malicious Outlook Reader
bash-logging-elk
blint
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
C2_Infrastructure
Unveiling the secret weapon of cyber attackers. This series explores Command & Control, the nerve center of online threats. Learn how attackers control your systems & how to defend your organization.
C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
CredMaster
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
CS-PushPlus
PushPlus
Evilginx-Phishing-Infra-Setup
Evilginx Phishing Engagement Infrastructure Setup Guide
solaHans's Repositories
solaHans/AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
solaHans/azureOutlookC2
Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for North Korean APT InkySquid / ScarCruft / APT37. TTP: Use Microsoft Graph API for C2 Operations.
solaHans/BadOutlook
(kinda) Malicious Outlook Reader
solaHans/blint
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
solaHans/C2_Infrastructure
Unveiling the secret weapon of cyber attackers. This series explores Command & Control, the nerve center of online threats. Learn how attackers control your systems & how to defend your organization.
solaHans/C3
Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing offensive toolkits.
solaHans/CredMaster
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
solaHans/CS-PushPlus
PushPlus
solaHans/Evilginx-Phishing-Infra-Setup
Evilginx Phishing Engagement Infrastructure Setup Guide
solaHans/Evilginx3-Phishlets
This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3.
solaHans/evilgophish
evilginx3 + gophish
solaHans/ExecuteAssembly_Mailslot
solaHans/gophish_mods
Open-Source Phishing Toolkit
solaHans/GraphStrike
Cobalt Strike HTTPS beaconing over Microsoft Graph API
solaHans/havoc_profile_generator
Havoc C2 profile generator
solaHans/Infra
Slides and Codes used for the workshop Red Team Infrastructure Automation
solaHans/py3tftp
An asynchronous TFTP server in pure Python 3.5
solaHans/Rapid-Operation-Deployment-for-Linode
Infrastructure as code framework for deploying servers to linode to be used in Red Team Operations
solaHans/Reaper
「💀」Proof of concept on BYOVD attack
solaHans/Red-Team-Infrastructure
Red Team Infrastructure Automation
solaHans/RedTeam-Scenarios
A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are company agnostic but technology specific giving you complete autonomy to start off without much modification.
solaHans/RedTeam_toolkit
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
solaHans/RedWarden
Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation
solaHans/secator
secator - the pentester's swiss knife
solaHans/terraSliv
Terraform to deploy sliver C2
solaHans/thief_raccoon
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is intended to raise awareness about cybersecurity threats and help users understand the importance of security measures like 2FA and password
solaHans/TokenTactics
Azure JWT Token Manipulation Toolset
solaHans/volana
🌒 Shell command obfuscation to avoid detection systems
solaHans/wreakHavoc
Port of CobaltStrike malleable C2 profiles for Havoc C2
solaHans/XiebroC2
Supports multi-person collaborative penetration testing graphical framework, Lua plug-in extension, domain front-end/CDN online, custom multiple modules, custom sRDI, file management, process management, memory loading, screenshot, Socks5