CronUp / Awesome-Red-TeamingLinks
List of Awesome Red Teaming Resources
☆13Updated 4 years ago
Alternatives and similar repositories for Awesome-Red-Teaming
Users that are interested in Awesome-Red-Teaming are comparing it to the libraries listed below
Sorting:
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- A repository with informtion related to Cloud Osint☆109Updated last week
- ☆149Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆46Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- ☆30Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 5 months ago
- a curated, categorised collection of useful projects 👨👩👧☆127Updated 3 weeks ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Just some lists of Malware Configs☆173Updated last year
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 5 years ago
- Useful resources about phishing email analysis☆86Updated 11 months ago
- ☆109Updated 4 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆136Updated 2 years ago
- This is a repository for network security tools and technologies.☆101Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- Ransomware groups posts☆44Updated this week
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆101Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆95Updated last month
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- ☆140Updated 3 years ago
- Python Gmail User Enumeration Tool☆15Updated 6 months ago
- Your go-to resource for all things OSINT☆180Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- URL fingerprinting made easy☆90Updated last year
- List of GREP modifications and alternatives for a variety of purposes☆134Updated last month