Red-Team-Infrastructure-Wiki
trape
Red-Team-Infrastructure-Wiki | trape | |
---|---|---|
3 | 12 | |
3,884 | 7,922 | |
- | - | |
1.2 | 0.0 | |
about 1 year ago | 3 months ago | |
Python | ||
BSD 3-clause "New" or "Revised" License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Red-Team-Infrastructure-Wiki
-
Phishing Infrastructure Resources?
I found this as a useful starting point: https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
- Some information and advice about DDoS, from someone who was there during #opPayback
-
logging into a raspberry pi
We have done it by connecting a Huawei LTE-Stick to a Raspberry Pi with Kali Linux. It automatically sets up a VPN connection to a control server in AWS where we have red teaming infrastructure set up. When we then connect the rpi into the network we can do some SSH port forwarding and connect to the rpi, which is now a network implant where we can do basically anything from. This sometimes requires finding Active Directory credentials around the office or through a phishing campaign (really easy with the access to the local network) or something, in order to get a foothold onto the AD infrastructure.
trape
-
TRACK PEOPLE ON THE INTERNET: Learn to track your opps world, to avoid being traced
Github Link
- ILPT Request: how do I track a phone...
- ILPT Request: How to bypass phishing detection? Google detects my phishing link that I send to shit faces that like to spread rumors and damage reputation. Google detects every link sent to an android phone.
- Some information and advice about DDoS, from someone who was there during #opPayback
- trape - Tool to track and execute intelligent social engineering attacks in real time.
- Tool to track and execute intelligent social engineering attacks in real time
- Using Pi4 running Bettercap as a honeypot to catch a legit stalker
-
Can you backtrace a VPN covered IP to reach its origin? If so, which is the process (from a high-level)
Well I would highly recommend using this Trape OSINT tool for tracking people on internet (Github)
- Android RAT
- What are some other cool tools for beginners like me ?
What are some alternatives?
gophish - Open-Source Phishing Toolkit
Android-RATList - Android - Remote Access Trojan List
i2pd - 🛡 I2P: End-to-End encrypted and anonymous Internet
email2phonenumber - A OSINT tool to obtain a target's phone number just by having his email address
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
dirsearch - Web path scanner
PhishDock - Automated Docker infrastructure with Gophish, Nginx Proxy Manager, Nginx and PHP
osmedeus - A Workflow Engine for Offensive Security
sovereign - A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
GRecon - Another version of katana, more automated but less stable. the purpose of this small tool is to run a Google based passive recon against your scope.
ScareCrow - ScareCrow - Payload creation framework designed around EDR bypass.
longtongue - Customized Password/Passphrase List inputting Target Info