Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation
☆16Sep 8, 2025Updated 5 months ago
Alternatives and similar repositories for Red-Team
Users that are interested in Red-Team are comparing it to the libraries listed below
Sorting:
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last week
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- 5 Minutes script to bypass Sucuri Cloudproxy in Python by using js2py☆12Sep 3, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆15Jul 25, 2021Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- ☆16May 3, 2021Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Sep 18, 2019Updated 6 years ago
- ☆17May 20, 2021Updated 4 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 weeks ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- Monitor areas on static map services & log new images☆23Aug 22, 2019Updated 6 years ago
- Simple script to get your private/public or both programs using the Hackerone graphql.☆22Jan 24, 2020Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- An Instagram Open Source Intelligence Tool☆21Jul 26, 2019Updated 6 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago