6vr / Red-Team-Tips
Red Team Stuffs
☆19Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Red-Team-Tips
- C2Matrix Automation☆12Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆23Updated last week
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- ☆21Updated last year
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆13Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 8 months ago
- Social Engineering Browser Update Attack.☆54Updated 11 months ago
- Tomcat backdoor based on CS blog☆25Updated last year
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Gmail/GSuite account enumeration tool☆47Updated 8 months ago
- Pentesting notes☆17Updated last year
- Quicky serve files over http or https using flask.☆35Updated 9 months ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 3 months ago
- C++ Code to perform a MiniDump of lsass.exe☆32Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆36Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆33Updated 2 years ago
- Open-Source Phishing Toolkit☆17Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early stages of a penetration test or re…☆17Updated last year