Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done through an Ethical Hacking team or similar offensive security team.
☆27Apr 15, 2025Updated 11 months ago
Alternatives and similar repositories for Red-Team
Users that are interested in Red-Team are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆19Mar 31, 2026Updated last week
- WAPTLab - Web Application Penetration Testing Lab☆96Dec 1, 2025Updated 4 months ago
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆764Nov 19, 2025Updated 4 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆18Feb 4, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Userscripts developed by me☆18Dec 25, 2024Updated last year
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- This contains all CTF challenges from old BYU-only CTFs.☆16Sep 10, 2024Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- ☆10Feb 20, 2026Updated last month
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated last month
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Jun 4, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 2 months ago
- This repo contains only quality verified training material/courses/labs that helps you establish and advance cyber career☆28Mar 25, 2024Updated 2 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 5 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 6 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆45Dec 15, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18Oct 1, 2025Updated 6 months ago
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- A compilation of CTF problems I've created for various CTFs☆34Oct 24, 2025Updated 5 months ago
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆22Updated this week
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆17Jan 8, 2026Updated 3 months ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Dec 9, 2024Updated last year
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 2 months ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- A toolkit for your red team operations☆34Oct 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tools for Pentesting that all hacker need....☆17Aug 26, 2022Updated 3 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 7 months ago
- [Phishing Tool]☆17Jul 18, 2025Updated 8 months ago
- Start your journey with Bug Bounty.☆15Oct 12, 2022Updated 3 years ago
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- The Firefox addon that applies a customizable dark screen over websites rather than making it high-contrast☆15Apr 1, 2024Updated 2 years ago
- ☆53Dec 16, 2024Updated last year