Personal notes from Red teamer for Blue/Red/Purple.
☆58Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for RedBlueNotes
Users that are interested in RedBlueNotes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated last year
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 4 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- ☆29May 25, 2021Updated 4 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 4 years ago
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 4 years ago
- DLL Unhooking☆12Mar 26, 2021Updated 5 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆137May 17, 2022Updated 3 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆271Oct 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆20Jun 1, 2024Updated last year
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.