☆52Oct 10, 2025Updated 5 months ago
Alternatives and similar repositories for redteam
Users that are interested in redteam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- ☆25Jan 11, 2023Updated 3 years ago
- SeRestorePrivilege to SYSTEM☆136Oct 8, 2021Updated 4 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Squid Pivoting Open Port Scanner☆100Dec 5, 2024Updated last year
- ☆51May 18, 2022Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- LimeSurvey Authenticated RCE☆24Jul 16, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- ☆185May 29, 2023Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- Root shell PoC for CVE-2021-3156☆71Feb 3, 2021Updated 5 years ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 2 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆130Oct 28, 2024Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆675May 3, 2020Updated 5 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- ☆89Jan 2, 2024Updated 2 years ago
- Juicy Potato for x86 Windows☆130Oct 12, 2019Updated 6 years ago
- POC for CVE-2024-23897 Jenkins File-Read☆39Nov 20, 2025Updated 4 months ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆40Feb 4, 2023Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 3 months ago
- Pentest Tool to generate usernames/logins based on supplied names.☆37Jan 7, 2019Updated 7 years ago
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆20May 3, 2022Updated 3 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- Ad hoc collection of Red Teaming & Active Directory tooling.☆229Aug 3, 2023Updated 2 years ago
- ☆20Jan 2, 2026Updated 2 months ago
- A VERY DANGEROUS PHISHING TOOL FOR LINUX USER☆14Aug 2, 2020Updated 5 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- Kerberoast with ACL abuse capabilities☆624Dec 16, 2024Updated last year
- Send controlled amount of bytes, send msf-pattern, calculate offset, custom buffer, badcharacters all in one.☆15Apr 20, 2024Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,362Sep 22, 2025Updated 6 months ago