OSCP guide and Red Team assessment Guide
☆37Jul 9, 2020Updated 5 years ago
Alternatives and similar repositories for Red-Team-Notes
Users that are interested in Red-Team-Notes are comparing it to the libraries listed below
Sorting:
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ☆12Oct 25, 2020Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- DICOM secuirty☆20Jul 18, 2020Updated 5 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆74Aug 20, 2021Updated 4 years ago
- Write-ups of All types Bugs☆21Apr 13, 2022Updated 3 years ago
- ☆21Jul 29, 2019Updated 6 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆99Oct 13, 2022Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- ☆36Feb 14, 2023Updated 3 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- ☆23Jun 17, 2024Updated last year
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆20Oct 31, 2018Updated 7 years ago
- Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...☆148Jul 30, 2020Updated 5 years ago
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Nov 29, 2022Updated 3 years ago
- The easy way to create a working directory with standard report template files for common security scenarios: penetration testing, CTF, t…☆16Jan 5, 2024Updated 2 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆14Sep 30, 2020Updated 5 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Excel parser for various pentesting tools.☆30Jun 13, 2023Updated 2 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- ☆12May 6, 2019Updated 6 years ago