This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows/Linux hacking.
☆221Apr 5, 2025Updated last year
Alternatives and similar repositories for RedTeam
Users that are interested in RedTeam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆53Apr 5, 2025Updated last year
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆53Apr 5, 2025Updated last year
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆49Apr 5, 2025Updated last year
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆39Apr 5, 2025Updated last year
- Performing website vulnerability scanning using OpenAI technologie☆67Apr 5, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or…☆1,247Apr 5, 2025Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Obsidian Templates for OSCP, CPTS, and Training labs☆121Nov 19, 2025Updated 5 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year
- A curated awesome list of lists of interview questions. Feel free to contribute!☆23Jul 24, 2024Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆17Dec 6, 2024Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- Scripts for offensive security☆203Apr 13, 2026Updated 2 weeks ago
- ☆14Dec 28, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆19Dec 30, 2023Updated 2 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 11 months ago
- ☆14Nov 11, 2023Updated 2 years ago
- ☆13Oct 16, 2025Updated 6 months ago
- my notes☆253Mar 29, 2026Updated last month
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Clickme is a powerful multi-step clickjacking tool designed for security professionals. Create, visualize, and demonstrate complex clickj…☆14Sep 4, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- These are the checklists I used during each phase of my CPTS Exam.☆47Jun 7, 2025Updated 10 months ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A checklist for systematically going through the OWASP Testing Guide V4☆17Jan 14, 2025Updated last year
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆152Mar 20, 2024Updated 2 years ago
- Web app usefullness☆35Mar 19, 2026Updated last month
- A comprehensive, step-by-step penetration testing checklist for ethical hackers. Covers pre-engagement, information gathering, analysis, …☆133Nov 19, 2024Updated last year
- ☆29Jul 7, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Kali Linux Guide☆83Aug 10, 2021Updated 4 years ago
- ☆16Aug 2, 2025Updated 8 months ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 2 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆151Aug 5, 2025Updated 8 months ago
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆310Apr 4, 2026Updated 3 weeks ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Sep 4, 2025Updated 7 months ago