Red-Team-X7 / redteam-notesLinks
☆12Updated 2 years ago
Alternatives and similar repositories for redteam-notes
Users that are interested in redteam-notes are comparing it to the libraries listed below
Sorting:
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆13Updated 7 months ago
- Challenge Python☆19Updated 2 years ago
- Automated tool for domains & Subdomains Gathering☆13Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated last year
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Simple username generator based on a list of name and surname☆12Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 7 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆17Updated 10 months ago
- ☆29Updated 3 years ago
- ☆20Updated 3 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆24Updated last year
- redteaming a simple language model like gpt2. based on anthropic redteaming paper☆8Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 9 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆18Updated last year
- Python Penetration Testing Tools☆17Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated 5 months ago
- Enumeration & fingerprint tool☆24Updated last year
- ☆15Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- ☆18Updated 9 months ago
- ☆30Updated 3 years ago
- ☆12Updated last month