BrAmaral / Purple-Team-Resources
A curated list of tools and resources that I use daily as a Purple-Team operator.
☆31Updated 3 weeks ago
Related projects: ⓘ
- ☆63Updated last year
- Collection of extra pentest tools for Kali Linux☆93Updated last year
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- ☆20Updated 9 months ago
- ☆38Updated 2 months ago
- A network logging tool that logs per process activities☆32Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 2 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆72Updated 3 years ago
- Red Teaming tools and techniques☆45Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆50Updated last year
- ☆75Updated 3 years ago
- Repository of cybersecurity mindmaps☆28Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆59Updated 6 months ago
- This repository contains information on the CVEs I found.☆34Updated 6 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- A compilation of important commands, files, and tools used in Pentesting☆50Updated last year
- OWASP based Web Application Security Testing Checklist☆64Updated 2 months ago
- ☆25Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Automate Scoping, OSINT and Recon assessments.☆89Updated 2 weeks ago
- ☆73Updated 3 years ago
- Resources, repos and scripts for pentesters and bug bounty.☆55Updated last week
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆79Updated last year
- ☆72Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 9 months ago
- Web Hacking and Red Teaming MindMap☆66Updated last year
- ☆26Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆82Updated last year
- ☆34Updated last year