ChoiSG / kr-redteam-playbookView external linksLinks
오펜시브 시큐리티 TTP, 정보, 그리고 대응 방안을 분석하고 공유하는 프로젝트입니다. 정보보안 업계 종사자들과 학생들에게 도움이 되었으면 좋겠습니다.
☆80Mar 30, 2025Updated 10 months ago
Alternatives and similar repositories for kr-redteam-playbook
Users that are interested in kr-redteam-playbook are comparing it to the libraries listed below
Sorting:
- ☆13Oct 21, 2023Updated 2 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 6 years ago
- My ctf challenges, mostly cryptography☆15Jul 13, 2025Updated 7 months ago
- 🐳 docker-compose 를 활용한 취약한 환경 구성 및 검증 (vulhub 한글판)☆35May 11, 2025Updated 9 months ago
- ☆46Nov 10, 2025Updated 3 months ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146May 18, 2024Updated last year
- 个人输出,经验/思路/想法/总结/. . .☆26Sep 6, 2021Updated 4 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆22Oct 19, 2019Updated 6 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Downlaod all the nuclei Templates created from many Bug Hunters☆29May 25, 2023Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 3 years ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30May 29, 2024Updated last year
- My security presentations☆29Aug 21, 2023Updated 2 years ago
- Temporary storage for exe2aut☆32Apr 17, 2019Updated 6 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- ☆36Oct 16, 2023Updated 2 years ago
- .NET deserialization hunter☆82Jul 21, 2024Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆235Oct 18, 2022Updated 3 years ago
- Reverse Shell-able Windows exploits short POCs.☆35Sep 28, 2020Updated 5 years ago
- Scripts and things.☆13Jan 23, 2026Updated 3 weeks ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Nov 9, 2023Updated 2 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Challenge source code and deployment scripts for UIUCTF 2022☆32Aug 9, 2022Updated 3 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Apr 4, 2016Updated 9 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 2 months ago
- ☆42Dec 26, 2022Updated 3 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- Threadless Process Injection using remote function hooking.☆809Sep 4, 2024Updated last year
- Personal Security Blog☆13Nov 4, 2024Updated last year
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago