RedefiningReality / Linux-Defence-MaterialsLinks
☆23Updated last year
Alternatives and similar repositories for Linux-Defence-Materials
Users that are interested in Linux-Defence-Materials are comparing it to the libraries listed below
Sorting:
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- A powershell module for hiding payloads in the pixels of images☆77Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- Tools and Resources for Physical Security Red Teaming☆46Updated 2 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆101Updated 5 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆106Updated 2 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- Educational Linux privilege escalation script for CTFs/OSCP. Explains WHAT/WHY/HOW for every vulnerability found. Highlights critical fin…☆48Updated 3 months ago
- Generate a reverse shell macro for Word documents.☆38Updated 3 years ago
- ☆65Updated 6 months ago
- ☆65Updated last year
- A blind SQL injection brute forcer☆113Updated 9 months ago
- Polymorphic Command & Control☆102Updated 11 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- :')☆47Updated 5 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆278Updated 3 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆109Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆32Updated last month
- ☆45Updated 2 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 9 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆148Updated 2 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆47Updated 3 months ago