dxnboy / redteamLinks
☆47Updated last month
Alternatives and similar repositories for redteam
Users that are interested in redteam are comparing it to the libraries listed below
Sorting:
- ☆38Updated 3 years ago
- ☆21Updated last year
- ☆91Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆120Updated 3 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Windows Privilege Escalation☆69Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- CLI monitor for windows process- & file activity☆94Updated 5 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 3 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆21Updated 4 years ago
- Some of my personal notes that helped me pass the OSWP☆59Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 10 months ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆67Updated 11 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆90Updated last year
- ☆38Updated 4 years ago
- linikatz is a tool to attack AD on UNIX☆151Updated 2 years ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Spoofcheck☆46Updated 6 months ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- ☆92Updated 5 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆43Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- ☆27Updated 3 years ago
- A webshell plugin and interactive shell for pentesting a WordPress website.☆101Updated 2 years ago