☆52Oct 10, 2025Updated 6 months ago
Alternatives and similar repositories for redteam
Users that are interested in redteam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- ☆25Jan 11, 2023Updated 3 years ago
- SeRestorePrivilege to SYSTEM☆136Oct 8, 2021Updated 4 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Squid Pivoting Open Port Scanner☆101Dec 5, 2024Updated last year
- ☆51May 18, 2022Updated 3 years ago
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆19Jan 31, 2025Updated last year
- ☆189May 29, 2023Updated 2 years ago
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 3 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆130Oct 28, 2024Updated last year
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆677May 3, 2020Updated 5 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- Juicy Potato for x86 Windows☆133Oct 12, 2019Updated 6 years ago
- POC for CVE-2024-23897 Jenkins File-Read☆39Nov 20, 2025Updated 4 months ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆40Feb 4, 2023Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 3 months ago
- Pentest Tool to generate usernames/logins based on supplied names.☆38Jan 7, 2019Updated 7 years ago
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20May 3, 2022Updated 3 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- Ad hoc collection of Red Teaming & Active Directory tooling.☆229Aug 3, 2023Updated 2 years ago
- ☆28Mar 31, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆21Jan 2, 2026Updated 3 months ago
- A VERY DANGEROUS PHISHING TOOL FOR LINUX USER☆14Aug 2, 2020Updated 5 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆17Jun 9, 2023Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆370Feb 12, 2024Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94May 20, 2021Updated 4 years ago
- Kerberoast with ACL abuse capabilities☆632Dec 16, 2024Updated last year