Red Teaming tools and techniques
☆56Feb 18, 2023Updated 3 years ago
Alternatives and similar repositories for Red-Teamer
Users that are interested in Red-Teamer are comparing it to the libraries listed below
Sorting:
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 9 months ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 2 years ago
- A collection of red blue team staff☆48Jun 1, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- WEB API fuzzing☆23Apr 30, 2025Updated 10 months ago
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- ☆11Oct 25, 2021Updated 4 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆27Mar 20, 2024Updated last year
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86May 5, 2023Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Dec 27, 2022Updated 3 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆20Jun 1, 2024Updated last year
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Mar 25, 2022Updated 3 years ago
- ☆20Dec 29, 2024Updated last year
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 2 months ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Aug 16, 2022Updated 3 years ago
- ☆29Sep 19, 2024Updated last year
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Feb 17, 2024Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Jul 21, 2015Updated 10 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- ☆22Apr 23, 2024Updated last year
- Everything and anything related to password spraying☆151May 20, 2024Updated last year
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆563Feb 12, 2026Updated 3 weeks ago