Scripts to help automate tedious red teaming enumeration and tasks.
☆17Mar 23, 2020Updated 5 years ago
Alternatives and similar repositories for Red-Team-Automation-Scripts
Users that are interested in Red-Team-Automation-Scripts are comparing it to the libraries listed below
Sorting:
- NT AUTHORITY\SYSTEM☆44Jul 8, 2020Updated 5 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Kernel Exploits☆260Jul 18, 2021Updated 4 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Dec 27, 2021Updated 4 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- Golden collection of weak passwords☆71Dec 12, 2024Updated last year
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- A BASH script to automate simple tasks related to static malware analysis☆12Oct 2, 2020Updated 5 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Cool resources and content for bug bounty hunting.☆19Oct 1, 2021Updated 4 years ago
- ☆18Feb 12, 2022Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated last week
- ☆16Jul 5, 2017Updated 8 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Framework to automate Bug Bounty Reconnaissance☆43Jan 4, 2021Updated 5 years ago
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Mar 17, 2020Updated 6 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆25Dec 24, 2025Updated 2 months ago
- Collection of scripts use for infrastructure maintenance.☆14Oct 31, 2025Updated 4 months ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Oct 28, 2022Updated 3 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆25Sep 21, 2023Updated 2 years ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆57Jan 5, 2025Updated last year
- ☆14Sep 13, 2021Updated 4 years ago
- A simple script for quickly mining sensitive information in binary files.☆30Dec 1, 2020Updated 5 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- @echo off title Activate Windows 7 / 8 / 8.1 / 10 for FREE!&cls&echo =====================================&echo #Copyright: MSGuides.com&…☆10Oct 22, 2020Updated 5 years ago