BrAmaral / Purple-Team-ResourcesLinks
A curated list of tools and resources that I use daily as a Purple-Team operator.
☆93Updated 8 months ago
Alternatives and similar repositories for Purple-Team-Resources
Users that are interested in Purple-Team-Resources are comparing it to the libraries listed below
Sorting:
- ☆144Updated 7 months ago
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- ☆42Updated last year
- ☆55Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆32Updated last month
- ☆44Updated last year
- Red Team Guides☆144Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆109Updated 2 weeks ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 8 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year
- ☆65Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆53Updated 3 years ago
- ☆78Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Updated 3 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- Challenge Python☆19Updated 2 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Updated 2 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆104Updated 6 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- ☆105Updated 4 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 5 months ago
- List of Command&Control (C2) software☆47Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- This is an AD pentest tools collection☆59Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆143Updated last year