CronUp / Awesome-Red-Teaming
List of Awesome Red Teaming Resources
☆13Updated 3 years ago
Alternatives and similar repositories for Awesome-Red-Teaming:
Users that are interested in Awesome-Red-Teaming are comparing it to the libraries listed below
- A list of awesome penetration testing tools and resources.☆80Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 8 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- Challenge Python☆19Updated last year
- A repository with informtion related to Cloud Osint☆88Updated 2 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 9 months ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated last week
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- Ransomware groups posts☆38Updated this week
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Tactics, Techniques, and Procedures☆25Updated 2 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- ☆19Updated last year
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Resources for AD penetration testing and security☆30Updated 3 years ago
- ☆29Updated 3 years ago
- ☆36Updated 3 years ago
- ☆34Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- Repository of cybersecurity mindmaps☆31Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago