☆78Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for RedTeam-Scripts
Users that are interested in RedTeam-Scripts are comparing it to the libraries listed below
Sorting:
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- Offensive Security OSWE Prep 2022☆76Sep 10, 2022Updated 3 years ago
- ☆65May 26, 2023Updated 2 years ago
- ☆244Jan 23, 2025Updated last year
- ☆60Oct 9, 2023Updated 2 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Azure and AWS Attacks☆1,114Nov 25, 2022Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Tools & Resources for Cyber Security Operations☆269May 19, 2025Updated 9 months ago
- ☆52Feb 8, 2024Updated 2 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- QR code Ghostmode☆25Jul 30, 2025Updated 7 months ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Purple Team Strategies, Published by Packt☆14Jan 30, 2023Updated 3 years ago
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- ☆13Mar 23, 2023Updated 2 years ago
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- ☆1,687Aug 19, 2022Updated 3 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- My public notes about offensive security☆166Sep 5, 2025Updated 5 months ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- ☆18Jun 25, 2024Updated last year
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- Google Hacking using Prompt ChatGPT☆16Jun 3, 2023Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Subdomain Scan (knockpy) in Python3☆13Oct 4, 2020Updated 5 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- URLs very strong obfuscation tool (can be used in requests too)☆16Oct 3, 2024Updated last year
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year