AlexisAhmed / Awesome-Red-Teaming
List of Awesome Red Teaming Resources
☆108Updated 6 years ago
Alternatives and similar repositories for Awesome-Red-Teaming:
Users that are interested in Awesome-Red-Teaming are comparing it to the libraries listed below
- A list of web application security☆79Updated 6 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆37Updated 5 years ago
- Opening the door, one reverse shell at a time☆184Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- ☆81Updated 5 years ago
- ☆99Updated 4 years ago
- Freely available programming books☆68Updated 6 years ago
- A random set of 5 machines for OSCP☆165Updated 4 years ago
- ☆76Updated 4 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- Stuff I use for OSCP/HTB/VHL and so on.☆109Updated 5 years ago
- A python based blind SQL injection exploitation script☆137Updated 5 years ago
- List of advanced XSS payloads☆85Updated 8 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆143Updated last year
- Short checklists for penetration testing methodology☆189Updated last year
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- Toolset for automating common management actions used in CTF's☆39Updated 3 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆36Updated 5 years ago
- Automatic & lightning fast wordpress vulnerability scanner☆45Updated 3 years ago
- ☆118Updated 4 years ago
- ☆66Updated 3 years ago
- Offensive Security / Pentesting Cheat Sheets☆99Updated 6 years ago
- A collection of personal scripts used in hacking excercises.☆151Updated 4 years ago
- Scripts and things that I have created when I was doing OSCP.☆43Updated 6 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- Active Directory Wordlists☆94Updated 4 years ago
- ☆43Updated 3 years ago
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆119Updated 5 years ago
- ☆25Updated 5 years ago