diff --git a/.gitmodules b/.gitmodules index 06c8365..ef9cc06 100644 --- a/.gitmodules +++ b/.gitmodules @@ -34,9 +34,6 @@ [submodule "red-teaming/Stracciatella"] path = red-teaming/Stracciatella url = https://github.com/mgeeky/Stracciatella.git -[submodule "red-teaming/malleable_redirector/proxy2"] - path = red-teaming/malleable_redirector/proxy2 - url = https://github.com/mgeeky/proxy2.git [submodule "red-teaming/cobalt-arsenal"] path = red-teaming/cobalt-arsenal url = https://github.com/mgeeky/cobalt-arsenal.git @@ -55,3 +52,6 @@ [submodule "red-teaming/SharpWebServer"] path = red-teaming/SharpWebServer url = https://github.com/mgeeky/SharpWebServer +[submodule "red-teaming/RedWarden"] + path = red-teaming/RedWarden + url = https://github.com/mgeeky/RedWarden diff --git a/red-teaming/README.md b/red-teaming/README.md index ba8bf03..aa6bcc3 100755 --- a/red-teaming/README.md +++ b/red-teaming/README.md @@ -294,8 +294,6 @@ PS E:\PowerSploit\Recon> Get-DomainOU | Get-DomainOUTree - **`macro-psh-stdin-author.vbs`** - VBS Social Engineering Macro with Powershell invocation taking arguments from Author property and feeding them to StdIn. ([gist](https://gist.github.com/mgeeky/50c4b7fa22d930a80247fea62755fbd3)) -- **`malleable_redirector`** - A [proxy2](https://github.com/mgeeky/proxy2) plugin for resilient, evasive C2 infrastructures covering your redirectors from AV/EDR/Sandbox/IR lurking eyes based on the CobaltStrike's Malleable C2 Profile specified. Combines advantages of classic evasion techniques such as Apache2 Mod_Rewrite/`.htaccess` and deep c2-profile-drive HTTP/HTTPS request inspection - - **`markOwnedNodesInNeo4j.py`** - This script takes an input file containing Node names to be marked in Neo4j database as owned = True. The strategy for working with neo4j and Bloodhound becomes fruitful during complex Active Directory Security Review assessments or Red Teams. Imagine you've kerberoasted a number of accounts, access set of workstations or even cracked userPassword hashes. Using this script you can quickly instruct Neo4j to mark that principals as owned, which will enrich your future use of BloodHound. ``` @@ -327,6 +325,8 @@ $ ./markOwnedNodesInNeo4j.py kerberoasted.txt - [**`PhishingPost`**](https://github.com/mgeeky/PhishingPost) - (PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML