Ne0nd0g / Red-Teaming-ToolkitLinks
A collection of open source and commercial tools that aid in red team operations.
☆13Updated 7 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- ☆17Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Subdomain Enumeration and Scanner☆33Updated 4 years ago
- Red Team Infrastructure: Covenant C2☆10Updated 5 years ago
- ☆18Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Antiscan.me automatization script☆27Updated last year
- Generic malicious browser check written in C#☆13Updated 8 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- ☆14Updated last year
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- ☆17Updated 4 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago