List of Awesome Red Teaming Resources
☆116Jan 2, 2019Updated 7 years ago
Alternatives and similar repositories for Awesome-Red-Teaming
Users that are interested in Awesome-Red-Teaming are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of web application security☆79Oct 8, 2018Updated 7 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆13Mar 11, 2019Updated 7 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆14Oct 28, 2018Updated 7 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆37Nov 3, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆15Sep 9, 2017Updated 8 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and mana…☆12Mar 29, 2020Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆24Jul 19, 2019Updated 6 years ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,179Aug 16, 2023Updated 2 years ago
- A Simple C Reverse Shell☆22Jan 9, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- Hacker101☆46Aug 14, 2018Updated 7 years ago
- Tools that i personally use for Bug Bounty Hunting and web assessments.☆293Jul 1, 2023Updated 2 years ago
- A collection of python scripts that are used for network analysis and testing.☆59Oct 4, 2019Updated 6 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- A TCP Client and Server Python3☆19Jul 10, 2024Updated last year
- a nginx reverse proxy with ssl and auth for MobSF☆26Mar 5, 2020Updated 6 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆10Aug 21, 2024Updated last year
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Burp Extension for easily creating Wordlists☆215Oct 5, 2021Updated 4 years ago
- Python3 Nmap Scanner☆111Feb 1, 2024Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆85Nov 7, 2020Updated 5 years ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆20Jul 21, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Burp Extension in Python hilighting DOM Sinks and Hosts using DOM XSS Wiki regex☆24Aug 28, 2013Updated 12 years ago
- golang tool to scan domains or single domains with know security issues against xmlrpc☆62Nov 9, 2023Updated 2 years ago
- ☆55Aug 22, 2017Updated 8 years ago
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago