This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
☆418Apr 1, 2026Updated last month
Alternatives and similar repositories for Red-Team-Playbooks
Users that are interested in Red-Team-Playbooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- From Zero To Hero☆38Apr 15, 2026Updated 3 weeks ago
- A summary of the most abbreviations I encountered so far☆29Apr 7, 2026Updated last month
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,413May 1, 2026Updated last week
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Field guide to gather low-hanging fruits☆15Mar 20, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OSCP Cheat Sheet☆3,724Updated this week
- purplestorm writeup collection☆31Updated this week
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆325Mar 24, 2026Updated last month
- Create and enumerate hidden desktops.☆91Dec 12, 2023Updated 2 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,719Apr 18, 2026Updated 3 weeks ago
- HookChain: A new perspective for Bypassing EDR Solutions☆603Jan 5, 2025Updated last year
- Windows Local Privilege Escalation Cookbook☆1,311Feb 5, 2026Updated 3 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,522Feb 15, 2026Updated 2 months ago
- Active Directory Auditing and Enumeration☆530Mar 31, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A self-hosted sandbox for red teams to test payloads against modern detection before deployment. MCP integration lets an LLM agent drive …☆1,412Updated this week
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆596Jun 12, 2024Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,270Feb 10, 2026Updated 2 months ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆507Dec 19, 2023Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆152May 5, 2022Updated 4 years ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆291Updated this week
- ☆905Mar 17, 2026Updated last month
- ☆91Aug 5, 2023Updated 2 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆310Apr 4, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆689Oct 23, 2025Updated 6 months ago
- ☆262Feb 17, 2023Updated 3 years ago
- game of active directory☆7,771Mar 12, 2026Updated last month
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆330May 17, 2024Updated last year
- RunPE implementation with multiple evasive techniques (1)☆388Sep 22, 2023Updated 2 years ago
- ☆142Jun 21, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,255Mar 28, 2025Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆1,076Mar 1, 2026Updated 2 months ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆414Sep 12, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Havoc Framework☆8,328Dec 18, 2025Updated 4 months ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,103Apr 13, 2026Updated 3 weeks ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆721May 7, 2025Updated last year
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,171Jul 19, 2024Updated last year
- From Zero To Hero☆35Apr 15, 2026Updated 3 weeks ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆405Jun 15, 2023Updated 2 years ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated last year