claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development.
☆1,264May 8, 2026Updated 2 weeks ago
Alternatives and similar repositories for Claude-Red
Users that are interested in Claude-Red are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A guide to modern exploit development, shellcode, EDR and WAF bypass, and initial Red Team access.☆29Mar 6, 2026Updated 2 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆168Nov 2, 2025Updated 6 months ago
- ☆41Oct 16, 2025Updated 7 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- Set of PoC to abuse Windows minifilters functionality☆83May 1, 2026Updated 3 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Asynchronous NFSv3 client in pure Python☆30Jul 16, 2025Updated 10 months ago
- ☆18Jul 21, 2025Updated 10 months ago
- SpringBlade框架JWT认证的漏洞检测工具☆11Apr 22, 2025Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- load shellcode without P/D Invoke and VirtualProtect call.☆170Sep 2, 2025Updated 8 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆93Sep 10, 2025Updated 8 months ago
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆220Mar 4, 2026Updated 2 months ago
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- An Ansible collection that installs an ADFS deployment with optional configurations.☆46Dec 19, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- Backend development stack for agents☆29Jul 30, 2025Updated 9 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆33Apr 2, 2025Updated last year
- Situational Awareness script to identify how and where to run implants☆68Dec 6, 2024Updated last year
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆92Jan 24, 2026Updated 3 months ago
- ☆51Aug 2, 2025Updated 9 months ago
- Things we learned from Capture The Flag hacking competitions we participated in☆22Mar 15, 2021Updated 5 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- IP address filter by City☆12Jan 17, 2025Updated last year
- Execute commands, in/exfiltrate files using your custom RPC Server☆68Jan 13, 2026Updated 4 months ago
- ☆44Jul 17, 2025Updated 10 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 5 months ago
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆53Jun 1, 2021Updated 4 years ago
- ☆19May 1, 2025Updated last year
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Enumerate Domain Users Without Authentication☆288Apr 22, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Runtime security enforcement and threat hunting engine for autonomous AI fleets. Build Swarm Detection & Response (SDR) platforms with Cl…☆279May 15, 2026Updated last week
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 3 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆18Jun 3, 2025Updated 11 months ago
- generates unique subdomain names and runs httpx on them☆18Apr 8, 2024Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆917May 7, 2026Updated 2 weeks ago
- A library to make HTTP requests with the Windows winhttp API☆25Feb 8, 2024Updated 2 years ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆54Nov 9, 2025Updated 6 months ago