CyberSecurityUP / Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
☆14Updated 2 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit:
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
- ☆29Updated 3 years ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- ☆20Updated 2 years ago
- ☆29Updated 3 years ago
- ☆22Updated 2 months ago
- ☆14Updated 3 years ago
- ☆24Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- Challenge Python☆19Updated last year
- ☆15Updated 3 years ago
- ☆77Updated last year
- ☆12Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 3 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- ☆73Updated 3 years ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆42Updated 3 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆18Updated 8 months ago
- ☆37Updated last year
- ☆19Updated 2 years ago
- ☆43Updated 3 years ago
- ☆15Updated 3 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆32Updated 4 years ago
- ☆64Updated last year
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆25Updated 4 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- ☆29Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago