Collection of tools that aid in red team operations
☆25Aug 23, 2018Updated 7 years ago
Alternatives and similar repositories for redteam_toolkit
Users that are interested in redteam_toolkit are comparing it to the libraries listed below
Sorting:
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆41May 21, 2018Updated 7 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- https://bc-security.gitbook.io/empire-wiki/☆13Aug 2, 2023Updated 2 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 6 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ObscurityLabs RedTeam C# Toolkit☆122Sep 3, 2019Updated 6 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- CCDC Red Team PWNboard☆77Mar 29, 2018Updated 7 years ago
- a patched sshd for red team activities☆84Aug 8, 2021Updated 4 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Interactive navi redteam cheats☆35Jul 22, 2025Updated 7 months ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Jul 6, 2017Updated 8 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Apr 1, 2020Updated 5 years ago
- ☆122Jan 7, 2026Updated 2 months ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- ☆11Feb 14, 2022Updated 4 years ago
- Snoopy v2.0.1 - Automated digital terrestrial tracking framework☆11Feb 10, 2017Updated 9 years ago
- Tool for password spraying RDP☆97Oct 12, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Jul 21, 2020Updated 5 years ago