boh / RedBlueNotes
Personal notes from Red teamer for Blue/Red/Purple.
☆53Updated last year
Alternatives and similar repositories for RedBlueNotes:
Users that are interested in RedBlueNotes are comparing it to the libraries listed below
- ☆22Updated 2 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A small red team course☆35Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 2 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- Cobalt Strike BOFS☆15Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆63Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆49Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆1Updated 8 months ago
- ☆24Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆33Updated last year
- ☆54Updated 3 months ago
- vulnlab.com reaper writeup☆26Updated last year
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- PoC-Malware-TTPs☆49Updated last year
- ☆57Updated 10 months ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- ☆52Updated 2 months ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 11 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year