Shubham-Khichi / RedTeam-ScenariosLinks
A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are company agnostic but technology specific giving you complete autonomy to start off without much modification.
☆12Updated 11 months ago
Alternatives and similar repositories for RedTeam-Scenarios
Users that are interested in RedTeam-Scenarios are comparing it to the libraries listed below
Sorting:
- Vulnerable API for research and education☆45Updated last month
- Hardening script for Windows (Domain mode or without domain)☆13Updated 3 months ago
- ☆242Updated 5 months ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆22Updated 10 months ago
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆35Updated last year
- Knowledge Management for Offensive Security Professionals Official Repository☆145Updated 4 months ago
- Cybersecurity Notes☆165Updated last year
- Threat Detection Engineering 101 Project☆17Updated 9 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆247Updated 2 years ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 3 months ago
- OWASP based Web Application Security Testing Checklist☆76Updated last year
- File Crawler index files and search hard-coded credentials☆33Updated 5 months ago
- A basic webapp to test XSS payloads.☆23Updated 2 years ago
- Damn Vulnerable API☆71Updated 4 months ago
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 6 months ago
- ☆71Updated 6 months ago
- The Arcanum Prompt Injection Taxonomy☆129Updated 2 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆122Updated 3 years ago
- Recon MindMap (RMM)☆159Updated last year
- List of tools and resources for pentesting Microsoft Active Directory☆76Updated 2 weeks ago
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆62Updated 5 months ago
- AI for Ethical Hacking - Workshop☆90Updated 3 weeks ago
- Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.☆35Updated this week
- Dredging up secrets from the depths of the file system☆128Updated 8 months ago
- This small script can download or update all the GitHub repo of your choice.☆21Updated last year
- ☆81Updated 2 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆47Updated last year
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- ☆67Updated 3 years ago
- OSCP preparation tools, scripts and cheatsheets☆57Updated 2 years ago