DavidJFelix / RedTeam
Evil snippets of Underhanded Red Team tactics
☆11Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for RedTeam
- ☆11Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- firewall port testing tool☆12Updated 6 years ago
- ☆11Updated 8 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Python crawler for remote Windows shares☆12Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- ☆10Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Nano meterpreter shell based on TinyMet☆27Updated 8 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago