-NOTES https://www.ired.team/ (RED TEAMING)
- Amass - https://github.com/OWASP/Amass (Attack Surface Mapping)
- Metabigor - https://github.com/j3ssie/metabigor (Non-API OSINT)
- AsINT_Collection - https://start.me/p/b5Aow7/asint_collection (Massive OSINT Collection)
- Email --> Phone# - https://github.com/iansangaji/email2phonenumber
- MFASweep - https://github.com/dafthack/MFASweep (MFA Check for Microsoft endpoints)
- Fast-Google-Dorks-Scan - https://github.com/IvanGlinkin/Fast-Google-Dorks-Scan?mc_cid=70cff8af7c&mc_eid=eff0f218d6 (Google Dork)
- Linkedin UserEnum - https://github.com/bigb0sss/LinkedinMama
- US Staff UserEnum - https://github.com/bigb0sss/USStaffMama
- NameSpi - https://github.com/waffl3ss/NameSpi
- Gitrob - https://github.com/michenriksen/gitrob/ (Github Search)
- truffleHog - https://github.com/dxa4481/truffleHog (Github Regex Search)
- Cloud_Security_Wiki - https://cloudsecwiki.com/azure_cloud.html (Awesome cloud resources)
- cloud_enum - https://github.com/initstring/cloud_enum
- MicroBurst - https://github.com/NetSPI/MicroBurst (AZURE)
- pacu - https://github.com/RhinoSecurityLabs/pacu (AWS)
- FestIn - https://github.com/cr0hn/festin (AWS)
- s3viewer - https://github.com/SharonBrizinov/s3viewer (AWS)
- Cloud_Pentest_Cheatsheet - https://github.com/dafthack/CloudPentestCheatsheets
- endgame - https://github.com/salesforce/endgame (AWS)
- ZGrab - https://github.com/zmap/zgrab (Banner grabber)
- Hardenize - https://www.hardenize.com/ (Domain Lookup)
- ADFSpoof - https://github.com/fireeye/ADFSpoof (Forge ADFS security tokens)
- Wordpress-Exploit-Framework - https://github.com/rastating/wordpress-exploit-framework
- Awesome-Web-Security - https://github.com/qazbnm456/awesome-web-security
- Java Deserialization - https://github.com/frohoff/ysoserial
- PHP Deserialization - https://github.com/ambionics/phpggc
- Kubernetes - https://github.com/loodse/kubectl-hacking
- SSRF - https://github.com/jdonsec/AllThingsSSRF
- Skf-labs - https://owasp-skf.gitbook.io/asvs-write-ups/ (Great Write-ups)
Phishing Techniques - https://blog.sublimesecurity.com/
- devicePhish - https://github.com/bigb0sss/Microsoft365_devicePhish
- TokenTactics - https://github.com/rvrsh3ll/TokenTactics
- Evilnginx2 - https://github.com/kgretzky/evilginx2
- EvilnoVNC - https://github.com/JoelGMSec/EvilnoVNC
- MSOLSpray - https://github.com/dafthack/MSOLSpray
- o365enum.py - https://github.com/gremwell/o365enum (Microsoft ActiveSync)
- goPassGen - https://github.com/bigb0sss/goPassGen (PasswordSpray List Generator)
- go365 - https://github.com/optiv/Go365 (Microsoft SOAP API endpoint on login.microsoftonline.com)
- Okta - https://github.com/Rhynorater/Okta-Password-Sprayer
- o365Spray - https://github.com/0xZDH/o365spray
- Spray365 - https://github.com/MarkoH17/Spray365 (Microsoft365 / Azure AD)
- Burp IPRotate - https://github.com/PortSwigger/ip-rotate (Utilizes AWS IP Gateway)
- ProxyCannon-NG - https://github.com/proxycannon/proxycannon-ng
- Cloud-proxy - https://github.com/tomsteele/cloud-proxy
- Proxy-NG - https://github.com/jamesbcook/proxy-ng
- Mubeng - https://github.com/kitabisa/mubeng#proxy-ip-rotator
- CIRT - https://cirt.net/passwords
- DefaultCreds-cheat-sheet - https://github.com/ihebski/DefaultCreds-cheat-sheet
- Beacon Command Cheatsheet - CS Commands
- Cobalt Strike Training Review
- SharpeningCobaltStrike - https://github.com/cube0x0/SharpeningCobaltStrike
- Alternative ExecuteAssembly - https://github.com/med0x2e/ExecuteAssembly
- Inline ExecuteAssembly - https://github.com/anthemtotheego/InlineExecute-Assembly (Executing .NET Assembly in the same process unline CS's Execute-Assembly)
- BOF (Beacon Object Files) - https://github.com/trustedsec/CS-Situational-Awareness-BOF
- Malleable C2 (Guideline) - CS4.0_guideline.profile
- Malleable C2 Randomizer - https://fortynorthsecurity.com/blog/introducing-c2concealer/
- SourcePoint - https://github.com/Tylous/SourcePoint
- OffensiveNotion - https://github.com/mttaggart/OffensiveNotion
- Havoc - https://github.com/HavocFramework/Havoc
- Merlin - https://github.com/Ne0nd0g/merlin
- Sliver -https://github.com/BishopFox/sliver
- Domain Fronting - https://www.bamsoftware.com/papers/fronting/
- Cloud-proxy - https://github.com/tomsteele/cloud-proxy
- Proxy-ng - https://github.com/jamesbcook/proxy-ng
- ProxyCannon - https://github.com/proxycannon/proxycannon-ng
- LOTS - https://lots-project.com/ (Trusted sites for C2/Phishing/Downloading)
- Seatbelt - https://github.com/GhostPack/Seatbelt (Ghostpack)
- DNS Enum - https://github.com/dirkjanm/adidnsdump
- Attacking & Securing Active Directory - https://rmusser.net/docs/index.html#/./Active_Directory?id=active-directory (Awesome references)
- pickl3 - https://github.com/hlldz/pickl3
- CredPhisher - https://github.com/matterpreter/OffensiveCSharp/tree/master/CredPhisher
- Mimikatz Command References - https://adsecurity.org/?page_id=1821
- SharpChromium - https://github.com/djhohnstein/SharpChromium (Chrome)
- EvilSeleium - https://github.com/mrd0x/EvilSelenium (Chrome)
- SharpDump - https://github.com/GhostPack/SharpDump (Highly IOC'd)
- SharpMiniDump - https://github.com/b4rtik/SharpMiniDump (Uses dynamic API calls, direct syscall and Native API unhooking to evade the AV / EDR detection - Win10 - WinServer2016)
- Dumper2020 - https://github.com/gitjdm/dumper2020
- Nanodump - https://github.com/helpsystems/nanodump
- SpectorOps - https://posts.specterops.io/offensive-lateral-movement-1744ae62b14f
- Pypykatz - https://github.com/skelsec/pypykatz (Python implementation of Mimikatz)
- Internal-Monologue - https://github.com/eladshamir/Internal-Monologue
- MSSQL - https://research.nccgroup.com/2021/01/21/mssql-lateral-movement/
- LiquidSnake - https://github.com/RiccardoAncarani/LiquidSnake (Fileless LM using WMI Event Subscriptions and GadgetToJScript)
- OffensiveCSharp - https://github.com/matterpreter/OffensiveCSharp
- C# Collection - https://github.com/midnightslacker/Sharp/blob/master/README.md
- LOLBAS - https://lolbas-project.github.io/
- xencrypt - https://github.com/the-xentropy/xencrypt (PowerShell)
- FalconStrike - https://github.com/slaeryan/FALCONSTRIKE
- AV_Bypass - https://github.com/Techryptic/AV_Bypass
- DotNetToJScript - https://github.com/tyranid/DotNetToJScript
- GadgetToJScript - https://github.com/med0x2e/GadgetToJScript
- GadgetToJScript - https://github.com/rasta-mouse/GadgetToJScript
- Shellcodeloader - https://github.com/knownsec/shellcodeloader (ShellcodeLoader of windows can bypass AV)
- SharpBlock - https://github.com/CCob/SharpBlock
- ScareCrow - https://github.com/optiv/ScareCrow (EDR Bypass Payload Creation Framework)
- Cobalt Strike Tradecraft
- p3nt4 - https://github.com/p3nt4
- moonwalk - https://github.com/mufeedvh/moonwalk (Linux logs/filesystem timestamps deletion)
- https://github.com/Ondrik8/exploit
- Undocumented Func (Win NT/2000/XP/Win7) - http://undocumented.ntinternals.net/
- Windows Syscall - https://j00ru.vexillium.org/syscalls/nt/64/
- Windows Undocumented Func - http://undocumented.ntinternals.net/
- Windows Kernel Exploit Training - https://codemachine.com/
- Anti-Debug - https://anti-debug.checkpoint.com/
- Vincent Yiu - https://vincentyiu.com
- Outflank - https://github.com/outflanknl
- Bank Security - https://github.com/BankSecurity/Red_Team
- Infosecn1nja - https://github.com/infosecn1nja (Redteam-Toolkit = AWESOME)
- Yeyintminthuhtut - https://github.com/yeyintminthuhtut
- RedCanary (Atomic RedTeam) - https://github.com/redcanaryco/atomic-red-team
- kmkz - https://github.com/kmkz/Pentesting (Good cheat-sheets)
- Rastamouse - https://offensivedefence.co.uk/authors/rastamouse/
- (Gitbook) dmcxblue - https://dmcxblue.gitbook.io/red-team-notes-2-0/
- Windows Server VMs - https://www.microsoft.com/en-us/evalcenter
- Windows 10 - https://www.microsoft.com/en-us/software-download/windows10ISO
- Archive of WinVMs - https://archive.org/search.php?query=subject%3A%22IEVM%22
- Public MSDN - Link
- Adversary Tactics: PowerShell - https://github.com/specterops/at-ps (Specterops)
- AWS Threat Simulation and Detection - https://github.com/sbasu7241/AWS-Threat-Simulation-and-Detection
- Stratus Red Team - https://github.com/DataDog/stratus-red-team
- Hackthebox - https://www.hackthebox.eu/
- Cyberseclab - https://www.cyberseclabs.co.uk/ (AD Focus)
- MITRE ATT&CK - https://attack.mitre.org/
- MalwareNews - https://malware.news/
- CWE - http://cwe.mitre.org/top25/archive/2019/2019_cwe_top25.html
- CTID - https://github.com/center-for-threat-informed-defense
- SpritesMods - http://spritesmods.com/?art=main (Product Security)
- Joeware - http://www.joeware.net/ (Windows AD Guru - Many AD Recon bins and amazing blogs)
- Tenable - https://github.com/tenable/poc (Exploit POCs)
- MalwareUnicorn - https://malwareunicorn.org/ (Malware/Reversing)
- Detection Lab - https://github.com/clong/DetectionLab
- KQL - https://github.com/DebugPrivilege/KQL
- Sigma - https://github.com/Neo23x0/sigma (Generic Signature Format for SIEM)
- Splunk Security Essential Docs - https://docs.splunksecurityessentials.com/content-detail/ (Various IOCs)
- Cobalt Strike Defense - https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence
- Dorothy - https://github.com/elastic/dorothy (Okta SSO Monitoring and Detection)
All the credits belong to the original authors and publishers.
- @bigb0ss
- @T145
- @threat-punter
- @3isenHeiM