DavidProbinsky / RedTeam-Physical-ToolsLinks
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
☆517Updated last year
Alternatives and similar repositories for RedTeam-Physical-Tools
Users that are interested in RedTeam-Physical-Tools are comparing it to the libraries listed below
Sorting:
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated last year
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆317Updated 3 years ago
- Script for generating revshells☆473Updated 10 months ago
- Work in progress...☆496Updated 9 months ago
- A RedTeam Toolkit☆402Updated 3 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆392Updated 6 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆251Updated last month
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated 10 months ago
- Repo containing cracked red teaming tools.☆183Updated last month
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆481Updated last year
- ☆420Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆275Updated 4 months ago
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆591Updated 6 months ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆437Updated 4 months ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆394Updated 3 years ago
- ☆429Updated 10 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆572Updated 9 months ago
- Kali noise reduction tool☆318Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆307Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆236Updated 10 months ago
- Hardware/IOT Pentesting Wiki☆674Updated 2 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆470Updated last week
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆748Updated 6 months ago
- ☆712Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆406Updated last month
- Red Team Guides☆138Updated last year
- Certified Red Team Operator☆417Updated 3 years ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆295Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago