DavidProbinsky / RedTeam-Physical-ToolsLinks
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
☆520Updated last year
Alternatives and similar repositories for RedTeam-Physical-Tools
Users that are interested in RedTeam-Physical-Tools are comparing it to the libraries listed below
Sorting:
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆531Updated last year
- Script for generating revshells☆476Updated 10 months ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆321Updated 3 years ago
- A RedTeam Toolkit☆404Updated this week
- Work in progress...☆499Updated 10 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆274Updated 5 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆253Updated 2 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated 11 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆398Updated 7 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆497Updated this week
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆393Updated 3 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆482Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆310Updated last year
- ☆712Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆437Updated 5 months ago
- ☆426Updated 2 years ago
- Hardware/IOT Pentesting Wiki☆687Updated this week
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆716Updated 6 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆574Updated last week
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆400Updated 6 months ago
- Kali noise reduction tool☆318Updated 2 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆237Updated 11 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,043Updated last year
- ☆430Updated 11 months ago
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆603Updated 7 months ago
- Command & Control-Framework created for collaboration in python3☆318Updated 2 years ago
- ☆301Updated last year
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests…☆277Updated last week