drk1wi / Red_TeamLinks
Some scripts useful for red team activities
☆13Updated 5 years ago
Alternatives and similar repositories for Red_Team
Users that are interested in Red_Team are comparing it to the libraries listed below
Sorting:
- Red Team Tool Kit☆16Updated 6 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- ☆17Updated 6 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- ☆19Updated 7 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- Code to check AWS S3 buckets☆17Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- ☆52Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- ☆9Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Collect OSINT from git repositories☆20Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- ☆15Updated 2 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- this contain many web shells used to make a backdoor on a server☆10Updated 8 years ago
- pen testing scripts☆12Updated 4 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆7Updated 5 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago