Mehdi0x90 / Red-Team
Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done through an Ethical Hacking team or similar offensive security team.
☆21Updated last month
Alternatives and similar repositories for Red-Team
Users that are interested in Red-Team are comparing it to the libraries listed below
Sorting:
- Web Hacking and Red Teaming MindMap☆73Updated 2 years ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆36Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆65Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- External recon toolkit☆48Updated 4 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- ☆55Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆26Updated last year
- Filter URLs to save your time.☆60Updated 2 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 9 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 5 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated 11 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated 5 months ago
- ☆74Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 6 months ago
- Azure Service Subdomain Enumeration☆59Updated 8 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 3 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- A command-line utility for performing reverse DNS lookups☆70Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 2 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆96Updated last month
- A collection of config files for linux focusing on hackthebox theme☆44Updated 4 months ago
- ☆60Updated 2 months ago
- ☆55Updated 2 months ago
- ☆26Updated 2 years ago
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆47Updated 4 months ago