A collection of handy and specific tools for the Red Teamer
☆11Aug 13, 2024Updated last year
Alternatives and similar repositories for RedTeamPets
Users that are interested in RedTeamPets are comparing it to the libraries listed below
Sorting:
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆26Sep 22, 2025Updated 6 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆15Sep 17, 2022Updated 3 years ago
- CTF Solution Writeups☆23May 21, 2023Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- Powershell script to monitor a wireless adapter every second until it disconnects.☆14May 15, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆50Aug 9, 2018Updated 7 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Collection of Study Material for SANS - FOR610☆18Jul 31, 2020Updated 5 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- A reasonably performant TF-IDF implementation.☆12Nov 20, 2022Updated 3 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- UAC bypass and Elevate☆14Sep 24, 2016Updated 9 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Mar 9, 2026Updated last week
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- The legend of random website☆21Mar 18, 2025Updated last year
- A set of additional PHPStan rules used in Oro products.☆13Updated this week
- ☆17Feb 4, 2020Updated 6 years ago
- Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)☆14May 15, 2021Updated 4 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆22Feb 8, 2026Updated last month
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated 11 months ago
- One off Scripts repo☆24Jan 20, 2023Updated 3 years ago
- Secure Login system using PHP with MYSQL database☆14Apr 14, 2021Updated 4 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- ☆41Apr 5, 2025Updated 11 months ago
- A shot code to Bypass UAC in Windows.☆26Apr 13, 2022Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- 🐳 Small Docker container to sniff the traffic of any other Docker container with tcpdump☆14Jul 16, 2022Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- Application for logging HTTP and DNS Requests☆15May 14, 2021Updated 4 years ago