☆12Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for redteam-notes
Users that are interested in redteam-notes are comparing it to the libraries listed below
Sorting:
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- Shadowsocks-like proxy written in Go☆37Dec 18, 2019Updated 6 years ago
- Stupid MQTT Brute Forcer☆32Jul 27, 2017Updated 8 years ago
- ☆18Oct 15, 2025Updated 4 months ago
- Resources, materials, links and information about AWS Bootcamp - Cloud Practitioner☆13Mar 29, 2023Updated 2 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Yet Another Rsync: a file synchronization and backup tool☆40Jan 13, 2026Updated last month
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Kendi ipv6 proxylerinizi üretin. "https://github.com/Sadzurami/tunnelbroker-proxies"☆10Oct 17, 2022Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- ☆15Sep 4, 2024Updated last year
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- black Ip lists, dorks-collection☆16Updated this week
- ☆11Aug 19, 2017Updated 8 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Dante socks proxy + FreeRadius + DaloRadius + MySQL + phpMyAdmin☆10Aug 29, 2017Updated 8 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Binary and Static Releases☆16Feb 20, 2026Updated last week
- ALL IN ONE Hacking Tool For Hackers☆10Dec 12, 2020Updated 5 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 4 months ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 8 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago