CronUp / Awesome-Red-TeamingLinks
List of Awesome Red Teaming Resources
☆13Updated 4 years ago
Alternatives and similar repositories for Awesome-Red-Teaming
Users that are interested in Awesome-Red-Teaming are comparing it to the libraries listed below
Sorting:
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆98Updated 9 months ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- A repository with informtion related to Cloud Osint☆110Updated 5 months ago
- List of GREP modifications and alternatives for a variety of purposes☆130Updated 7 months ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 3 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆132Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆167Updated 3 weeks ago
- Ransomware groups posts☆42Updated this week
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- ☆149Updated 2 years ago
- ☆105Updated 4 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆45Updated this week
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆85Updated last month
- List of Command&Control (C2) software☆43Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- ☆98Updated 4 years ago
- ☆138Updated 2 years ago
- ☆39Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆248Updated this week
- Just some lists of Malware Configs☆172Updated 8 months ago
- Useful resources about phishing email analysis☆85Updated 7 months ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated last week
- Daily alert when a new domain name is registered and contains your keywords☆119Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆99Updated 10 months ago