aungthurhahein / Red-Team-Curation-ListView external linksLinks
A list to discover work of red team tooling and methodology for penetration testing and security assessment
☆77Mar 8, 2019Updated 6 years ago
Alternatives and similar repositories for Red-Team-Curation-List
Users that are interested in Red-Team-Curation-List are comparing it to the libraries listed below
Sorting:
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 7 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated 11 months ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- Some talks about security☆13Nov 20, 2020Updated 5 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Mar 2, 2020Updated 5 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 4 years ago
- Awesome Cyber-Security Data-sets Collection☆22Aug 30, 2018Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆148Feb 14, 2019Updated 7 years ago
- A List Of Labs For People (Students) Who Want Learn OR Practice IT Security / Hacking / Penetration Testing In Ethical Way.☆90Nov 25, 2020Updated 5 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated 3 weeks ago
- ☆10Nov 21, 2023Updated 2 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆10Dec 4, 2018Updated 7 years ago
- The Zonemaster GUI - part of the Zonemaster project☆17Feb 9, 2026Updated last week
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Random source codes☆26Dec 22, 2025Updated last month
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆18Jun 12, 2020Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Enumerate S3 buckets via certstream, domain, or keywords☆15Feb 27, 2018Updated 7 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Pipe different tools with google dork Scanner☆56Jun 25, 2020Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago