Covert Red Team Attack Infrastructure Logo

Covert Red Team Attack Infrastructure

0
Free
Visit Website

Covert red team attack infrastructure is the back-end component used for red team operations, encompassing domains, redirectors, SMTP servers, and payload hosting servers. Design considerations and thought process behind the infrastructure are crucial for effective operations.

FEATURES

ALTERNATIVES

Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.

A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.

A tool that finds more information about a given URL or domain by querying multiple data sources.

A cross-platform web fuzzer written in Nim

CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.

CTF toolkit for rapid exploit development and prototyping.

Python utility for testing the existence of domain names under different TLDs to find malicious subdomains.

PINNED