HildeTeamTNT / Red-Teaming-Toolkit
☆18Updated 4 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 11 months ago
- ☆39Updated 4 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 10 months ago
- Just my findings of malwares☆43Updated 2 years ago
- ☆18Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆34Updated last month
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Windows priviledge escalation script☆13Updated 3 months ago
- ☆70Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated 10 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆44Updated 3 weeks ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated 7 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆20Updated last month
- ☆51Updated last year
- ☆84Updated 3 months ago
- ☆40Updated 2 years ago
- Azure Service Subdomain Enumeration☆59Updated 8 months ago
- List of Command&Control (C2) software☆39Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- ☆54Updated 5 months ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 3 months ago
- ☆47Updated 3 years ago
- ☆14Updated last year
- ☆19Updated 2 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆26Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆20Updated 3 years ago