DavidJFelix / RedTeam
Evil snippets of Underhanded Red Team tactics
☆11Updated 7 years ago
Alternatives and similar repositories for RedTeam:
Users that are interested in RedTeam are comparing it to the libraries listed below
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆11Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆17Updated 7 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 11 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Env Scraper for Linux Post Exploitation☆9Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Windows Privesc Check☆20Updated 10 years ago
- ☆11Updated 6 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- ☆13Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 8 years ago
- firewall port testing tool☆12Updated 6 years ago
- Python crawler for remote Windows shares☆13Updated 9 years ago
- A Tool for cross-platform System Enumeration☆12Updated 7 years ago