6vr / Red-Team-TipsLinks
Red Team Stuffs
☆19Updated 2 years ago
Alternatives and similar repositories for Red-Team-Tips
Users that are interested in Red-Team-Tips are comparing it to the libraries listed below
Sorting:
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- ☆25Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆32Updated 7 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆61Updated 6 months ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆17Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- XMLRPC - RCE in MovableTypePoC☆21Updated 3 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- This is working POC of CVE-2022-36271☆9Updated 2 years ago
- Enumeration & fingerprint tool☆25Updated last year
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆43Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆17Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆20Updated 9 months ago
- ☆13Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- Quicky serve files over http or https using flask.☆35Updated 5 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year