Ondrik8 / RED-TeamView external linksLinks
☆138Jun 25, 2021Updated 4 years ago
Alternatives and similar repositories for RED-Team
Users that are interested in RED-Team are comparing it to the libraries listed below
Sorting:
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆50Feb 23, 2022Updated 3 years ago
- ☆19Sep 24, 2025Updated 4 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆20Nov 12, 2024Updated last year
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Репозиторий содержит список вопросов по наступальной безопасности.☆358Oct 26, 2025Updated 3 months ago
- A web service to clean documents from potentially privacy-invasive metadata☆49Apr 29, 2025Updated 9 months ago
- Reverse Shell - technique is commonly used in cyber attacks☆20Mar 2, 2024Updated last year
- A CLI tool that bundles source code files into a single context for LLM prompts☆21Jan 9, 2025Updated last year
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,767Sep 11, 2025Updated 5 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆15Nov 24, 2023Updated 2 years ago
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆16Mar 27, 2024Updated last year
- TeaVin - Ultimate ESP32 EvilTwin☆13Mar 25, 2024Updated last year
- Automate Burp Suite Professional setup on macOS with multi-version support, JDK 21, built-in keygen, and instant launcher for pentesters …☆20Sep 27, 2025Updated 4 months ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- simple shellcode injector for Windows / Process Hollowing☆15Jun 26, 2024Updated last year
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated last year
- Transparent proxy through Tor with optionally DNSCrypt and Anonymized-DNS feature enabled.☆12Jul 23, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- ☆65Apr 28, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- All in 1 phishing framework☆37Aug 20, 2022Updated 3 years ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,136Jul 19, 2024Updated last year
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 2 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Feb 10, 2023Updated 3 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated last year
- Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.☆1,085Mar 7, 2025Updated 11 months ago
- Web GUI for collecting messages from Telegram channels☆117Oct 19, 2024Updated last year
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- Bitrix vulnerability scanner☆23Mar 28, 2023Updated 2 years ago
- Hackings style defence tricks☆58Dec 30, 2025Updated last month
- ☆19Aug 26, 2020Updated 5 years ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆43May 22, 2025Updated 8 months ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆487Apr 17, 2025Updated 9 months ago