BrAmaral / Purple-Team-Resources
A curated list of tools and resources that I use daily as a Purple-Team operator.
☆36Updated this week
Alternatives and similar repositories for Purple-Team-Resources:
Users that are interested in Purple-Team-Resources are comparing it to the libraries listed below
- Mind Maps for penetration testing☆18Updated 4 years ago
- ☆64Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆130Updated last year
- Repository of cybersecurity mindmaps☆31Updated 2 years ago
- ☆24Updated 2 weeks ago
- Challenge Python☆19Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- List of Command&Control (C2) software☆34Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆102Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- A network logging tool that logs per process activities☆32Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆65Updated 3 weeks ago
- ☆34Updated last month
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆14Updated 2 years ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆25Updated 4 months ago
- ☆55Updated 9 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Tools used for Pentesting☆22Updated last year
- ☆34Updated last year
- Red Teaming tools and techniques☆50Updated 2 years ago
- ☆79Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 3 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆13Updated 9 months ago
- A curated list wordlists for bruteforcing and fuzzing☆81Updated last year
- ☆43Updated 3 years ago
- Red Team Guides☆135Updated last year
- OWASP based Web Application Security Testing Checklist☆69Updated 7 months ago
- ☆26Updated 2 years ago