Red-Team-Infrastructure-Wiki
ScareCrow
Red-Team-Infrastructure-Wiki | ScareCrow | |
---|---|---|
3 | 11 | |
3,884 | 2,552 | |
- | - | |
1.2 | 0.0 | |
about 1 year ago | 9 months ago | |
Go | ||
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Red-Team-Infrastructure-Wiki
-
Phishing Infrastructure Resources?
I found this as a useful starting point: https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
- Some information and advice about DDoS, from someone who was there during #opPayback
-
logging into a raspberry pi
We have done it by connecting a Huawei LTE-Stick to a Raspberry Pi with Kali Linux. It automatically sets up a VPN connection to a control server in AWS where we have red teaming infrastructure set up. When we then connect the rpi into the network we can do some SSH port forwarding and connect to the rpi, which is now a network implant where we can do basically anything from. This sometimes requires finding Active Directory credentials around the office or through a phishing campaign (really easy with the access to the local network) or something, in order to get a foothold onto the AD infrastructure.
ScareCrow
- ScareCrow v5 - a rewrite of the framework with new features, IoC's removed & new evasion techniques added.
- Red team engagement help!
- ScareCrow – Payload creation framework designed around EDR bypass
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
- ScareCrow is a payload creation framework for generating loaders for the use of side loading (not injection) into a legitimate Windows process (bypassing Application Whitelisting controls). Once the DLL loader is loaded into memory, utilizing a technique to flush an EDR’s hook out the system DLLs ru
-
ScareCrow - Payload Creation Framework Designed Around EDR Bypass
https://github.com/optiv/ScareCrow
- optiv/ScareCrow - Payload creation framework designed around EDR bypass
- GitHub - optiv/ScareCrow: ScareCrow - Payload creation framework designed around EDR bypass.
- ScareCrow - Payload creation framework designed around EDR bypass
What are some alternatives?
gophish - Open-Source Phishing Toolkit
InlineWhispers - Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)
i2pd - 🛡 I2P: End-to-End encrypted and anonymous Internet
sliver - Adversary Emulation Framework
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
maskphish - Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
PhishDock - Automated Docker infrastructure with Gophish, Nginx Proxy Manager, Nginx and PHP
CamPhish - Grab cam shots from target's phone front camera or PC webcam just sending a link.
sovereign - A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
Mythic - A collaborative, multi-platform, red teaming framework
LOIC - Deprecated - Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox's LOIC project. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. IF YOU GET V& IT IS YOUR FAULT.
evilgrade - Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.