Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done through an Ethical Hacking team or similar offensive security team.
☆27Apr 15, 2025Updated 11 months ago
Alternatives and similar repositories for Red-Team
Users that are interested in Red-Team are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆18Aug 24, 2025Updated 7 months ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆17Feb 4, 2021Updated 5 years ago
- ملخص شامل لمفاهيم وشروط شهادة CompTIA Security+ SY0-701، مستند إلى وثيقة CompTIA Security Plus SY0-701 Exam Objectives. يقدم معلومات مركز…☆14Mar 14, 2025Updated last year
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆193May 17, 2024Updated last year
- This contains all CTF challenges from old BYU-only CTFs.☆16Sep 10, 2024Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 6 months ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated last month
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Jun 4, 2023Updated 2 years ago
- This repo contains only quality verified training material/courses/labs that helps you establish and advance cyber career☆28Mar 25, 2024Updated last year
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 5 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- 远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查☆12Aug 9, 2024Updated last year
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- ☆10Sep 12, 2024Updated last year
- ☆18Oct 1, 2025Updated 5 months ago
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆16Jan 8, 2026Updated 2 months ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Dec 9, 2024Updated last year
- AD related packs are here!☆16Feb 16, 2023Updated 3 years ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- A toolkit for your red team operations☆34Oct 24, 2021Updated 4 years ago
- Brute Force instagram , The tool can Crack passwords, has 7 options for trying to hack an Instagram account☆17Jan 23, 2025Updated last year
- ☆20Jan 6, 2025Updated last year
- Tools for Pentesting that all hacker need....☆17Aug 26, 2022Updated 3 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- [Phishing Tool]☆17Jul 18, 2025Updated 8 months ago