OSCP guide and Red Team assessment Guide
☆37Jul 9, 2020Updated 5 years ago
Alternatives and similar repositories for Red-Team-Notes
Users that are interested in Red-Team-Notes are comparing it to the libraries listed below
Sorting:
- ☆19Jul 23, 2021Updated 4 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ☆14Sep 30, 2020Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Scans the typos of candidate election pages for typosquatters☆18Oct 25, 2018Updated 7 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆74Aug 20, 2021Updated 4 years ago
- DICOM secuirty☆20Jul 18, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Jan 12, 2023Updated 3 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Some binaries/scripts that may be useful in red team/pentest exercises☆22Updated this week
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Write-ups of All types Bugs☆21Apr 13, 2022Updated 3 years ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Nov 29, 2022Updated 3 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Jun 19, 2024Updated last year
- ☆21Jul 29, 2019Updated 6 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆23Jun 17, 2024Updated last year
- ☆25Feb 11, 2024Updated 2 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Notes from OSCP, CTF, security adventures, etc...☆64Feb 6, 2024Updated 2 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- Relative Path Overwrite Vulnerability Scanner☆22May 11, 2022Updated 3 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Dec 14, 2017Updated 8 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- InHouse safetynet killer☆31Jun 23, 2019Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago