Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done through an Ethical Hacking team or similar offensive security team.
☆27Apr 15, 2025Updated 10 months ago
Alternatives and similar repositories for Red-Team
Users that are interested in Red-Team are comparing it to the libraries listed below
Sorting:
- ملخص شامل لمفاهيم وشروط شهادة CompTIA Security+ SY0-701، مستند إلى وثيقة CompTIA Security Plus SY0-701 Exam Objectives. يقدم معلومات مركز…☆14Mar 14, 2025Updated 11 months ago
- Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.☆753Nov 19, 2025Updated 3 months ago
- This repo contains only quality verified training material/courses/labs that helps you establish and advance cyber career☆28Mar 25, 2024Updated last year
- ☆18Oct 1, 2025Updated 5 months ago
- Brute Force instagram , The tool can Crack passwords, has 7 options for trying to hack an Instagram account☆17Jan 23, 2025Updated last year
- A Midi-to-SVG/PDF converter for various music boxes.☆11Feb 1, 2026Updated last month
- Example project demonstrating how to deploy a FastAPI app to Fly.io.☆16Updated this week
- ClickHeat by blade1o6 is a visual heatmap of clicks on a HTML page, showing hot and cold click zones☆19Jan 13, 2011Updated 15 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Dec 15, 2023Updated 2 years ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- An experiment, a playground, a sandbox, a toy — LLMs judging code.☆10Jan 28, 2025Updated last year
- WIP Comprehensive reference description of telegram theming elements☆16Mar 8, 2024Updated last year
- Client side web application build to help Youtubers deal with thousands of comments☆10Apr 29, 2020Updated 5 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- 3D (Stereoscopic) Camera streamer using two Raspberry Pi Zeros and two Pi Cameras in a ProtoStax Enclosure☆10Jan 9, 2025Updated last year
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- ☆10Feb 20, 2026Updated last week
- Control your local Android device from your browser.☆16Jul 16, 2025Updated 7 months ago
- Streamlit Dashboard over Superstore Data stored in Postgres Docker container. With SQLAlchemy + Plotly Express☆13Oct 16, 2024Updated last year
- ☆10Sep 12, 2024Updated last year
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆190May 17, 2024Updated last year
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- ☆16Updated this week
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Baidu Search MCP Server I A Model Context Protocol (MCP) server that provides web search capabilities through Baidu, with additional feat…☆22Oct 27, 2025Updated 4 months ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated 2 weeks ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- Awesome Bug bounty tools☆13Jun 28, 2024Updated last year
- UCL ENGF34 Design and Professional Skills☆13Dec 11, 2023Updated 2 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- ☆51Oct 10, 2025Updated 4 months ago
- Listens to LIRC daemon and sends it to MQTT☆12Feb 5, 2021Updated 5 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Secure, Multi-Tenant MCP Server Framework for Modern AI☆27Jun 9, 2025Updated 8 months ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Dec 9, 2024Updated last year
- ☆16Aug 27, 2025Updated 6 months ago