offensive-initial-access
SnailSploit/Claude-Red
This comprehensive checklist provides a detailed methodology for simulating the initial access phase in red team engagements and penetration testing. It covers a wide spectrum of modern attack vectors, including advanced social engineering (e.g., deepfake, BEC), sophisticated phishing (spear/smishing), exploiting exposed perimeter services (RDP/VPN), and identifying cloud misconfigurations. Use this guide when planning or executing the initial foothold stage to ensure comprehensive coverage against modern threats.