RedELK-Client : Deploying Cybersecurity Monitoring With Ansible

12 months ago

The RedELK client components using Ansible, a powerful automation tool that streamlines the installation and management of cybersecurity monitoring systems.…

Crawl4AI – The Future Of Asynchronous Web Crawling For AI

12 months ago

Crawl4AI simplifies asynchronous web crawling and data extraction, making it accessible for large language models (LLMs) and AI applications. Looking…

OXO Scan Orchestration Engine – A Comprehensive Guide To Scalable Security Assessments

12 months ago

OXO is a security scanning framework built for modularity, scalability and simplicity. OXO Engine combines specialized tools to work cohesively…

Nullinux – The Comprehensive SMB Enumeration Tool For Penetration Testing

12 months ago

Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares,…

MANSPIDER – Advanced SMB Crawling For Sensitive Data Detection

12 months ago

textract, one of manspider's upstream dependencies, is no longer being updated. For this reason, you may run into problems when…

EDR-Antivirus-Bypass-To-Gain-Shell-Access

12 months ago

This repository contains a proof-of-concept (PoC) for bypassing EDR and antivirus solutions using a memory injection technique. The code executes…

GShark – A Comprehensive Guide To Sensitive Information Management System Deployment

12 months ago

The project is based on Go and Vue to build a management system for sensitive information detection. For the full…

C2 Server Installation – A Comprehensive Guide For Red Team Operations

12 months ago

Setting up a Command and Control (C2) server is a critical step in establishing a robust red team infrastructure. This…

Redirector Installation – A Comprehensive Guide For Red Team Operations

12 months ago

Installing and configuring redirectors as part of your red team infrastructure. Follow these step-by-step instructions to deploy and optimize redirectors…

Generating Keys And Packages – A Guide To Securing RedELK Server Communications

12 months ago

This step generates TLS key pairs. This is used for encrypting the filebeat traffic between redirectors/C2servers and the RedELK server.…