DavidProbinsky / RedTeam-Physical-ToolsLinks
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
☆512Updated last year
Alternatives and similar repositories for RedTeam-Physical-Tools
Users that are interested in RedTeam-Physical-Tools are comparing it to the libraries listed below
Sorting:
- Script for generating revshells☆472Updated 9 months ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆315Updated 2 years ago
- A RedTeam Toolkit☆400Updated 2 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆384Updated 5 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated last year
- ☆713Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆466Updated 10 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆468Updated this week
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆295Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆300Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆397Updated last week
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests…☆272Updated 3 weeks ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆167Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆570Updated 8 months ago
- Work in progress...☆494Updated 9 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆785Updated 2 months ago
- Shodan Dorks 2023☆237Updated 5 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆618Updated 7 months ago
- ☆724Updated 3 years ago
- Shodan Dorks☆404Updated 4 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆245Updated 2 weeks ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆676Updated 2 months ago
- Certified Red Team Operator☆416Updated 3 years ago
- ☆417Updated 2 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆478Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆577Updated 7 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- Red Team Cheatsheet in constant expansion.☆1,205Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆415Updated 3 weeks ago