Reconnaishawnce / Red-Team
Tools and Resources for Physical Security Red Teaming
☆29Updated last month
Alternatives and similar repositories for Red-Team:
Users that are interested in Red-Team are comparing it to the libraries listed below
- ☆33Updated last month
- ☆61Updated 9 months ago
- Discovering Typo Squatting on your domains!☆64Updated 6 months ago
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- 🕵️ Email osint tool☆62Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated last week
- ☆26Updated 2 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated last year
- Red Teaming tools and techniques☆49Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆125Updated 6 months ago
- A collection of tools that I use in CTF's or for assessments☆89Updated last week
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆31Updated last year
- ☆64Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆57Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 11 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆22Updated 2 months ago
- Web Hacking and Red Teaming MindMap☆70Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆113Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆61Updated 3 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆64Updated 2 weeks ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated 11 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- Mass bruteforce authentication of common services with common credentials.☆45Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year