claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development.
☆1,133Apr 15, 2026Updated 2 weeks ago
Alternatives and similar repositories for Claude-Red
Users that are interested in Claude-Red are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆38Oct 16, 2025Updated 6 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆168Nov 2, 2025Updated 6 months ago
- ☆17Jan 10, 2025Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆90Sep 10, 2025Updated 7 months ago
- ☆18Jul 21, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SpringBlade框架JWT认 证的漏洞检测工具☆11Apr 22, 2025Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- load shellcode without P/D Invoke and VirtualProtect call.☆169Sep 2, 2025Updated 8 months ago
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- An Ansible collection that installs an ADFS deployment with optional configurations.☆45Dec 19, 2025Updated 4 months ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- Backend development stack for agents☆29Jul 30, 2025Updated 9 months ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆32Apr 2, 2025Updated last year
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆92Jan 24, 2026Updated 3 months ago
- ☆51Aug 2, 2025Updated 9 months ago
- Things we learned from Capture The Flag hacking competitions we participated in☆22Mar 15, 2021Updated 5 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- ☆44Jul 17, 2025Updated 9 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆68Jan 13, 2026Updated 3 months ago
- ☆19May 1, 2025Updated last year
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 2 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 10 months ago
- generates unique subdomain names and runs httpx on them☆18Apr 8, 2024Updated 2 years ago
- Cortex XDR Config Extractor☆141Mar 10, 2023Updated 3 years ago
- A library to make HTTP requests with the Windows winhttp API☆25Feb 8, 2024Updated 2 years ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆112Jan 4, 2024Updated 2 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 9 months ago
- Echo Hack The Talk Materials 2019☆12Sep 12, 2019Updated 6 years ago
- ☆14Sep 16, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆21Jul 15, 2025Updated 9 months ago
- Parses Snaffler output file and generate beautified outputs.☆142Jan 4, 2026Updated 3 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Jan 23, 2026Updated 3 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month