OSCP guide and Red Team assessment Guide
☆38Jul 9, 2020Updated 5 years ago
Alternatives and similar repositories for Red-Team-Notes
Users that are interested in Red-Team-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Aug 8, 2019Updated 6 years ago
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 8 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆23Oct 25, 2021Updated 4 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 4 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- buffer overflow examples☆24Dec 20, 2017Updated 8 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 5 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆74Aug 20, 2021Updated 4 years ago
- Write-ups of All types Bugs☆22Apr 13, 2022Updated 4 years ago
- Some web-based ACME tools.☆17May 8, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆100Oct 13, 2022Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Feb 13, 2021Updated 5 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- This batch script file wants to check your EDR systems detection and response capabilities in a more noisy way!☆12Jul 3, 2020Updated 5 years ago
- ☆36Feb 14, 2023Updated 3 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆23Jun 17, 2024Updated last year
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- ☆12Dec 30, 2020Updated 5 years ago
- CVE-2022-23131漏洞利用工具开箱即用。☆11Apr 2, 2022Updated 4 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆22Oct 31, 2018Updated 7 years ago
- Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...☆147Jul 30, 2020Updated 5 years ago
- Vulnerable Task Manager☆22May 13, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Claude Code skill that detects 40 AI writing patterns and rewrites text to sound human. Self-auditing loop. Bilingual (EN/ES).☆65Mar 22, 2026Updated last month
- This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.☆27Nov 29, 2022Updated 3 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 6 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 3 years ago
- ☆14Sep 30, 2020Updated 5 years ago