Covert red team attack infrastructure is the back-end component used for red team operations, encompassing domains, redirectors, SMTP servers, and payload hosting servers. Design considerations and thought process behind the infrastructure are crucial for effective operations.
FEATURES
SIMILAR TOOLS
SharpPrinter enables efficient discovery of network printers for security and management purposes.
A penetration testing framework for identifying and exploiting vulnerabilities.
A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
A modern post-exploitation command and control framework with a client-server architecture and extensibility features.
A powerful tool for extracting passwords and performing various Windows security operations.
A proof-of-concept tool that demonstrates automated MFA bypass techniques for Microsoft Outlook through browser automation and request interception.
An open-source penetration testing framework for social engineering with custom attack vectors.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.