redshell 
 Red Team Tool
 An interactive command-line interface for red teaming and pentesting
An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Optional Cobalt Strike integration pulls beacon SOCKS4/5 proxies from the team server. Automatically logs activities to a local CSV file and a Cobalt Strike team server (if configured).
209 stars
 16 watching
 42 forks
 
Language: Python 
last commit: about 3 years ago  Related projects:
| Repository | Description | Stars | 
|---|---|---|
|    |  A collection of tools and resources for simulating a red teaming attack on computer systems. | 6,133 | 
|    |  Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. | 615 | 
|    |  A collection of tools to simulate an adversary's actions and test security controls | 9,158 | 
|    |  Tools for Red Team testing and exploitation of Windows systems. | 716 | 
|    |  A toolkit to facilitate network pivoting for red team operations and penetration testing | 437 | 
|    |  A toolset for deploying and managing a full Red Team Infrastructure using Docker | 1,214 | 
|    |  A collection of scripts and configurations for centralized logging of red team infrastructure | 98 | 
|    |  A wiki providing resources and guidance on setting up resilient Red Team infrastructure for penetration testing and adversarial security assessments. | 4,167 | 
|    |  A Cobalt Strike platform-based red team automation framework for vulnerability scanning and exploitation testing | 1,797 | 
|    |  A collection of PowerShell scripts designed to simulate common red team activities and test an organization's security posture. | 1,552 | 
|    |  A tool used in penetration testing to retrieve hashes and credentials from Windows systems, domain controllers, and other network devices. | 1,204 | 
|    |  A collection of AWS-focused tools for red team operations using Python and the boto3 SDK. | 166 | 
|    |  An instrument used to identify and exploit network proxy configurations and execute shellcode on compromised systems | 141 | 
|    |  A collection of tips and techniques for penetration testing and red teaming | 1,046 | 
|    |  A toolset for working with direct system calls in Cobalt Strike's Beacon Object Files via Syswhispers2 | 178 |