HildeTeamTNT / Red-Teaming-ToolkitLinks
☆18Updated 4 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆69Updated 4 months ago
- ☆85Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- ☆105Updated 10 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- My Favorite Offensive Security Scripts☆75Updated 3 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆71Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Just my findings of malwares☆43Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆114Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆163Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆99Updated 3 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆59Updated last year
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated last year
- ⚠️ Malware Development training ⚠️☆35Updated 5 months ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 3 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- Tool for enumerating Active Directory environments☆48Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- ☆38Updated last year
- ☆51Updated last year