This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
☆402Feb 28, 2026Updated last month
Alternatives and similar repositories for Red-Team-Playbooks
Users that are interested in Red-Team-Playbooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- From Zero To Hero☆37Jul 17, 2025Updated 8 months ago
- A summary of the most abbreviations I encountered so far☆28Jan 18, 2026Updated 2 months ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,318Mar 22, 2026Updated last week
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- OSCP Cheat Sheet☆3,672Mar 18, 2026Updated last week
- purplestorm writeup collection☆30Mar 21, 2026Updated last week
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆321Updated this week
- Create and enumerate hidden desktops.☆91Dec 12, 2023Updated 2 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,608Mar 18, 2025Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆595Jan 5, 2025Updated last year
- Windows Local Privilege Escalation Cookbook☆1,287Feb 5, 2026Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,390Feb 15, 2026Updated last month
- Active Directory Auditing and Enumeration☆521Dec 3, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,334Nov 12, 2025Updated 4 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,261Feb 10, 2026Updated last month
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆505Dec 19, 2023Updated 2 years ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆284Oct 8, 2025Updated 5 months ago
- Azure AD cheatsheet for the CARTP course☆150May 5, 2022Updated 3 years ago
- ☆898Mar 17, 2026Updated last week
- ☆91Aug 5, 2023Updated 2 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆303Jan 1, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆681Oct 23, 2025Updated 5 months ago
- ☆259Feb 17, 2023Updated 3 years ago
- game of active directory☆7,610Mar 12, 2026Updated 2 weeks ago
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆324May 17, 2024Updated last year
- RunPE implementation with multiple evasive techniques (1)☆384Sep 22, 2023Updated 2 years ago
- ☆143Jun 21, 2023Updated 2 years ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆408Sep 12, 2023Updated 2 years ago
- The Havoc Framework☆8,256Dec 18, 2025Updated 3 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ↕️🤫 Stealth redirector for your red team operation security☆1,067Mar 1, 2026Updated 3 weeks ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆702May 7, 2025Updated 10 months ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,098Updated this week
- From Zero To Hero☆35Jul 17, 2025Updated 8 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,153Jul 19, 2024Updated last year
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆399Jun 15, 2023Updated 2 years ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆203Mar 26, 2025Updated last year