This repo will contain some basic pentest/RT commands.
☆37Jun 2, 2022Updated 3 years ago
Alternatives and similar repositories for Red-Team-Essentials
Users that are interested in Red-Team-Essentials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Jul 24, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- A shot code to Bypass UAC in Windows.☆26Apr 13, 2022Updated 4 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- A Python based Nessus GUI Parser that parses .nessus files and generates two structured HTML Reports - VA Table and Detailed Findings.☆16Apr 19, 2025Updated 11 months ago
- ☆19Dec 1, 2025Updated 4 months ago
- ☆12Dec 14, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Disposable and resilient red team infrastructure with Terraform☆277Feb 1, 2019Updated 7 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆16May 15, 2020Updated 5 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆16May 29, 2021Updated 4 years ago
- Pull secrets from an AWS environment☆67Feb 2, 2020Updated 6 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Jun 11, 2025Updated 10 months ago
- SecTalks socially authored website☆20Jul 23, 2025Updated 8 months ago
- source code for the offsecml framework☆44Jun 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Dec 4, 2020Updated 5 years ago
- offensive notes & resources☆43Apr 7, 2025Updated last year
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆107Jan 24, 2024Updated 2 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- ☆11May 28, 2022Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Windows internals and exploitation tricks☆113Mar 28, 2026Updated 2 weeks ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆370Jun 24, 2025Updated 9 months ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,504Dec 21, 2023Updated 2 years ago