Collection of tools that aid in red team operations
☆25Aug 23, 2018Updated 7 years ago
Alternatives and similar repositories for redteam_toolkit
Users that are interested in redteam_toolkit are comparing it to the libraries listed below
Sorting:
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆41May 21, 2018Updated 7 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Apr 1, 2020Updated 5 years ago
- Tool for password spraying RDP☆98Oct 12, 2018Updated 7 years ago
- Go (golang) client library for the Dropbox core and Datastore API with support for uploading and downloading encrypted files.☆12May 22, 2017Updated 8 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 4 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- A collection of scripts to interact with Veracode's API☆16Jul 18, 2019Updated 6 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- https://bc-security.gitbook.io/empire-wiki/☆13Aug 2, 2023Updated 2 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- ☆121Jan 7, 2026Updated last month
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 5 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Sep 3, 2019Updated 6 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago