A0RX / RedblueteampartyLinks
A collection of red blue team staff
☆46Updated 2 years ago
Alternatives and similar repositories for Redblueteamparty
Users that are interested in Redblueteamparty are comparing it to the libraries listed below
Sorting:
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆92Updated 2 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- ☆41Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆76Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- ☆86Updated 5 months ago
- OSCP Study Guide☆40Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- ☆29Updated 4 years ago
- Tool for enumerating Active Directory environments☆48Updated last year
- My Favorite Offensive Security Scripts☆75Updated 3 months ago
- ☆24Updated 3 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- ☆24Updated 5 months ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆51Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- ☆119Updated 2 years ago