A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are company agnostic but technology specific giving you complete autonomy to start off without much modification.
☆17Jul 26, 2024Updated last year
Alternatives and similar repositories for RedTeam-Scenarios
Users that are interested in RedTeam-Scenarios are comparing it to the libraries listed below
Sorting:
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆19Aug 11, 2022Updated 3 years ago
- With PRTG Scheduler, you can configure customized maintenance windows for every PRTG object (Sensors, Devices, and Groups). It allows for…☆15Feb 13, 2019Updated 7 years ago
- Resources from B-Sides Bloomington OSINT Workshop☆13Sep 14, 2024Updated last year
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Heap Defence Game for Flipper Zero☆12Apr 27, 2023Updated 2 years ago
- List of Hacker/Infosec/CyberSec Discord servers☆35Mar 17, 2023Updated 3 years ago
- Python module to manage PRTG servers☆20Mar 11, 2024Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Greenbone Security Assistant HTTP Server - The server talking to the Greenbone Vulnerability Management daemon (gvmd).☆21Updated this week
- OWASP Foundation web repository☆17Oct 11, 2025Updated 5 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- ☆21Jan 2, 2026Updated 2 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 5 months ago
- ☆23Jun 1, 2022Updated 3 years ago
- Flipper Zero firmware source code☆13Nov 15, 2025Updated 4 months ago
- ☆19Jan 31, 2025Updated last year
- ☆13Aug 10, 2022Updated 3 years ago
- Public release for b01lers CTF 2022. Thanks for playing!☆13Apr 29, 2022Updated 3 years ago
- mindmap created for tools can be used during analysis/investigation☆28Jan 4, 2017Updated 9 years ago
- ☆47Sep 9, 2023Updated 2 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 2 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- RTTTL txt files that will work with the FIipperZero Music Player☆20Sep 24, 2024Updated last year
- My workflow made with shell script, some API's and tools. ;)☆11Nov 25, 2025Updated 3 months ago
- ☆15Nov 15, 2023Updated 2 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- Deployment of chromadb into AWS resources through terraform☆17Sep 23, 2023Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- A curated list of awesome 🏧 hacking resources.☆20Dec 4, 2025Updated 3 months ago
- BLE Spam app patched to work on OFW☆34Oct 3, 2024Updated last year