Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation
☆16Sep 8, 2025Updated 6 months ago
Alternatives and similar repositories for Red-Team
Users that are interested in Red-Team are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 5 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated 2 months ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- ☆16May 3, 2021Updated 4 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last month
- Monitor areas on static map services & log new images☆23Aug 22, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Jul 12, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- 5 Minutes script to bypass Sucuri Cloudproxy in Python by using js2py☆12Sep 3, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- An Instagram Open Source Intelligence Tool☆21Jul 26, 2019Updated 6 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Automates some API functions, automates minigames.☆16Jan 2, 2020Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- An async Python client library for Empire's RESTful API☆26Dec 6, 2023Updated 2 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Dec 16, 2020Updated 5 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A collection of PHP backdoors. For educational or testing purposes only.☆15Apr 8, 2018Updated 7 years ago
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆15Jul 25, 2021Updated 4 years ago
- Common php webshells. Do not host the file(s) on your server!☆18May 20, 2016Updated 9 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- A mini Multi-Threaded ProxyServer + HTTPserver in python using socket programming☆12Jun 9, 2016Updated 9 years ago
- MySQL Injection Exfoliation Optimization☆24Sep 15, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated last month
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago