Collections of way to evade normal detection events.
☆23Sep 13, 2020Updated 5 years ago
Alternatives and similar repositories for RedTeam_Bypass-Detections
Users that are interested in RedTeam_Bypass-Detections are comparing it to the libraries listed below
Sorting:
- Cheatsheets and other Yealink Phone information.☆17Apr 13, 2018Updated 7 years ago
- Collection of scripts, libraries, and other quick go to grabs☆24Feb 17, 2026Updated 2 weeks ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- Collection of Dashboards for Threat Hunting and more!☆74Oct 17, 2020Updated 5 years ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆75Jun 13, 2021Updated 4 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- ☆30May 1, 2025Updated 10 months ago
- HBHC is a tool writeen in Python3 for Cracking the hashes in speed, it's small and handy tools required only 2 arguments. 🏡 🍪 🔑 🔨☆21Sep 5, 2021Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆19Oct 25, 2025Updated 4 months ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Quickly filter in-scope domains & urls for bug bounty☆20Mar 19, 2021Updated 4 years ago
- X_INSTA Powerful INSTAGRAM Password Brute Force Tool For Windows☆31Dec 8, 2022Updated 3 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- TRC20 Token and smart contracts.☆10Sep 28, 2021Updated 4 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 4 months ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- An awesome directory of AI tools. The list here is the data source for the searchable web directory @ https://www.aitoollist.org . Discov…☆18May 7, 2025Updated 9 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Python toolkit and package for analyzing enzyme activity data☆10Jun 17, 2022Updated 3 years ago
- Kismet website generation & documentation data☆12Feb 7, 2026Updated 3 weeks ago
- Toponym-based Algorithm for Grouped Geoparsing of Social media☆11Mar 30, 2020Updated 5 years ago
- ☆15Mar 3, 2021Updated 5 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- ☆20Feb 18, 2021Updated 5 years ago
- A 2d online fighting game using unity +photon pun2 + firebase realtime database . Includes basic functions of logging in, registering, bu…☆13Aug 23, 2024Updated last year
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- Run Docker containers with a non-root user by default☆11Mar 17, 2019Updated 6 years ago
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Build real Python projects with 92 beginner-friendly challenges. Learn by doing with guided coding exercises and practical applications.☆12Oct 23, 2025Updated 4 months ago