☆10Oct 9, 2024Updated last year
Alternatives and similar repositories for RedTeaming
Users that are interested in RedTeaming are comparing it to the libraries listed below
Sorting:
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- P.A.C.K.E.R is a simple DRM software that can grant and verify serial keys, encrypt & decrypt [RSA & AES] your software. It also has modu…☆27May 12, 2021Updated 4 years ago
- ☆34May 14, 2018Updated 7 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Projects on undocumented windows APIs, a keylogger PoC, and dll injection PoC. Based off of a Defcon workshop☆36Jan 13, 2018Updated 8 years ago
- ☆10Jul 22, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆40Feb 4, 2023Updated 3 years ago
- Local CLI tool that lets you write natural language instructions and get the corresponding shell commands generated by a small language m…☆21Nov 18, 2025Updated 3 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Control de rele por protocolo HTTP Rest☆10Dec 8, 2021Updated 4 years ago
- Professional RAG development skills for Claude Code - audit, evaluate, optimize, and scaffold RAG pipelines☆24Jan 18, 2026Updated last month
- This is a template to create a responisive and mobile friendly website based on flask and python. Please like, fork and improve it on you…☆11Aug 21, 2022Updated 3 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Jun 14, 2024Updated last year
- ☆11Sep 11, 2024Updated last year
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- ☆14Dec 6, 2024Updated last year
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- Virtual network manager - Manages containers and VMs to create a virtual network setup☆12May 12, 2024Updated last year
- ☆10Mar 9, 2021Updated 4 years ago
- Unofficial Easypanel JS SDK☆13Nov 28, 2023Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Prototype of the HealthOS ventilation system☆14Mar 27, 2020Updated 5 years ago
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 3 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- ☆13Sep 21, 2021Updated 4 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- ☆12Oct 9, 2022Updated 3 years ago