Red-Team-Infrastructure-Wiki
sovereign
Red-Team-Infrastructure-Wiki | sovereign | |
---|---|---|
3 | 6 | |
3,884 | 10,394 | |
- | 0.0% | |
1.2 | 0.0 | |
about 1 year ago | over 1 year ago | |
HTML | ||
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Red-Team-Infrastructure-Wiki
-
Phishing Infrastructure Resources?
I found this as a useful starting point: https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
- Some information and advice about DDoS, from someone who was there during #opPayback
-
logging into a raspberry pi
We have done it by connecting a Huawei LTE-Stick to a Raspberry Pi with Kali Linux. It automatically sets up a VPN connection to a control server in AWS where we have red teaming infrastructure set up. When we then connect the rpi into the network we can do some SSH port forwarding and connect to the rpi, which is now a network implant where we can do basically anything from. This sometimes requires finding Active Directory credentials around the office or through a phishing campaign (really easy with the access to the local network) or something, in order to get a foothold onto the AD infrastructure.
sovereign
-
Ask HN: Share your new devbox setup process My own setup is included here
I find the fundamental problem with this sort of server setup script/config management is that they inevitably get quite personal. Nobody really wants to use another devs and when you try to allow for a lot of customisation they tend get byzantine and complex.
That said I still think it's worth sharing. If nothing else we can all usually cherry pick nice ideas from each other.
I had an entirely private set of Ansible roles I'd cobbled together that I started to put in a more shareable state a couple of years ago. It has little overlap with what you're putting together, but I do think you might find the way it separates personal Ansible config and the main project roles into separate directories (and thus different git repos) useful.
I really need to dust off my project and get it to a releasable state this year [momod](https://github.com/adrinux/momod).
I assume you've come across the many similar projects like [Sovereign](https://github.com/sovereign/sovereign), [Mistborn](https://gitlab.com/cyber5k/mistborn)
-
Self Hosting
You could also check out the Sovereign project on github which automatically sets up a home server including xmpp serivce.
- Some information and advice about DDoS, from someone who was there during #opPayback
- Email Authenticity 101: DKIM, Dmarc, and SPF
- Possible Piratebox alternatives
-
Screw it, I’ll host it myself
Shoutout to Sovereign[1] nice ansible project to automate most of this kind of home setup
[1] https://github.com/sovereign/sovereign
What are some alternatives?
gophish - Open-Source Phishing Toolkit
Sandstorm - Sandstorm is a self-hostable web productivity suite. It's implemented as a security-hardened web app package manager.
i2pd - 🛡 I2P: End-to-End encrypted and anonymous Internet
Syncloud - Run popular services on your device with one click
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
Ansible-NAS - Build a full-featured home server or NAS replacement with an Ubuntu box and this playbook.
PhishDock - Automated Docker infrastructure with Gophish, Nginx Proxy Manager, Nginx and PHP
OpenMediaVault - openmediavault is the next generation network attached storage (NAS) solution based on Debian Linux. Thanks to the modular design of the framework it can be enhanced via plugins. openmediavault is primarily designed to be used in home environments or small home offices.
ScareCrow - ScareCrow - Payload creation framework designed around EDR bypass.
DockSTARTer - DockSTARTer helps you get started with running apps in Docker.
LOIC - Deprecated - Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox's LOIC project. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. IF YOU GET V& IT IS YOUR FAULT.
WikiSuite - An HTML5 management interface for KVM guests