☆138Jun 25, 2021Updated 4 years ago
Alternatives and similar repositories for RED-Team
Users that are interested in RED-Team are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆50Feb 23, 2022Updated 4 years ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- ☆20Sep 24, 2025Updated 6 months ago
- Репозиторий содержит список вопросов по наступальной безопасности.☆367Updated this week
- Коллекция из нескольких сотен онлайн-инструментов для OSINT☆55Feb 11, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A web service to clean documents from potentially privacy-invasive metadata☆50Apr 29, 2025Updated 11 months ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,791Sep 11, 2025Updated 7 months ago
- ☆27Nov 24, 2024Updated last year
- Коллекция материалов по OSINT для нетсталкинга☆480Jan 31, 2021Updated 5 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Reverse Shell - technique is commonly used in cyber attacks☆20Mar 2, 2024Updated 2 years ago
- TeaVin - Ultimate ESP32 EvilTwin☆13Mar 25, 2024Updated 2 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,168Jul 19, 2024Updated last year
- ☆25Aug 2, 2023Updated 2 years ago
- Bitrix vulnerability scanner☆23Mar 28, 2023Updated 3 years ago
- A CLI tool that bundles source code files into a single context for LLM prompts☆21Jan 9, 2025Updated last year
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆232Oct 8, 2024Updated last year
- Hackings style defence tricks☆62Dec 30, 2025Updated 3 months ago
- ☆16Mar 29, 2024Updated 2 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- ☆111Dec 8, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆65Apr 28, 2024Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.☆1,096Mar 7, 2025Updated last year
- ☆10Jul 14, 2021Updated 4 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆76Dec 15, 2025Updated 4 months ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆114Oct 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆485Apr 17, 2025Updated last year
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Dec 16, 2023Updated 2 years ago
- Collection of knowledge about information security☆677Mar 8, 2026Updated last month
- Awesome Operational Security resources☆46Dec 2, 2016Updated 9 years ago
- Web GUI for collecting messages from Telegram channels☆118Oct 19, 2024Updated last year
- ✍️ A browser add-on (Firefox, Chrome, Thunderbird) that allows you to autocorrect common text sequences and convert text characters to a …☆12Feb 9, 2026Updated 2 months ago