antonytuff / Red-Team-NotesLinks
OSCP guide and Red Team assessment Guide
☆35Updated 5 years ago
Alternatives and similar repositories for Red-Team-Notes
Users that are interested in Red-Team-Notes are comparing it to the libraries listed below
Sorting:
- OSWE Preparation☆37Updated 6 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Notes for CRTP☆41Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- ☆104Updated 5 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆77Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- ☆31Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆18Updated this week
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- Posts about different topics☆40Updated last month
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated this week
- My collection of self-written exploits☆24Updated 3 years ago
- Reverse Shell-able Windows exploits short POCs.☆32Updated 5 years ago
- ☆14Updated 4 years ago
- ☆83Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆56Updated 4 years ago
- You don't need wires to be connected☆41Updated 5 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆38Updated this week
- ☆24Updated 6 years ago
- ☆16Updated 6 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- ☆67Updated 6 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- ☆48Updated 4 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago