Scripts to help automate tedious red teaming enumeration and tasks.
☆17Mar 23, 2020Updated 5 years ago
Alternatives and similar repositories for Red-Team-Automation-Scripts
Users that are interested in Red-Team-Automation-Scripts are comparing it to the libraries listed below
Sorting:
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated last month
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- ☆16Jul 5, 2017Updated 8 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Dec 27, 2021Updated 4 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago
- Golden collection of weak passwords☆71Dec 12, 2024Updated last year
- what the fuck is this shit☆25Dec 14, 2015Updated 10 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- Open Source Vulnerability Disclosure Program☆24Oct 29, 2021Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- ☆27Mar 5, 2023Updated 2 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Nov 4, 2024Updated last year
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- Shadowsocks-like proxy written in Go☆37Dec 18, 2019Updated 6 years ago
- Stupid MQTT Brute Forcer☆32Jul 27, 2017Updated 8 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- A simple Python SSH server that reveals passwords of connecting clients☆32Jul 7, 2017Updated 8 years ago