CronUp / Awesome-Red-Teaming
List of Awesome Red Teaming Resources
☆13Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Awesome-Red-Teaming
- A list of awesome penetration testing tools and resources.☆77Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Ransomware groups posts☆35Updated this week
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆73Updated 4 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆128Updated last year
- A single place for all my Threat Intel and OSINT tools and commands☆10Updated last week
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year
- Repository of cybersecurity mindmaps☆30Updated last year
- Hive v5 file decryption algorithm☆34Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated 5 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆43Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆28Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆45Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆29Updated 4 years ago
- ☆42Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A collection of cyberchef recipes for use in osint investigations☆13Updated 2 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 9 months ago
- Security Operation Center Lab☆15Updated last month
- A repository with informtion related to Cloud Osint☆80Updated 3 weeks ago
- List of Command&Control (C2) software☆34Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 4 months ago
- Tactics, Techniques, and Procedures☆19Updated 8 months ago
- A learning and testing environment for web application hacking and pentesting.☆24Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆30Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 2 years ago