Red-Team-X7 / redteam-notesLinks
☆12Updated 2 years ago
Alternatives and similar repositories for redteam-notes
Users that are interested in redteam-notes are comparing it to the libraries listed below
Sorting:
- ☆18Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 10 months ago
- ☆23Updated last year
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- ☆12Updated 2 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆24Updated last year
- ☆17Updated 9 months ago
- ☆14Updated 3 months ago
- Challenge Python☆19Updated 2 years ago
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- ☆28Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆8Updated last year
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆13Updated 8 months ago
- ☆18Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- ☆43Updated 2 months ago
- ☆10Updated 6 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 9 months ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 6 months ago
- MQTT exploit and Pentesting guide for penetration tester☆12Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Enumeration & fingerprint tool☆25Updated last year
- [Confluence] CVE-2023-22527 realworld poc☆19Updated last year