This repo will contain some basic pentest/RT commands.
☆37Jun 2, 2022Updated 3 years ago
Alternatives and similar repositories for Red-Team-Essentials
Users that are interested in Red-Team-Essentials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆19Jul 24, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- A shot code to Bypass UAC in Windows.☆26Apr 13, 2022Updated 4 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- ☆20Dec 1, 2025Updated 5 months ago
- ☆12Dec 14, 2021Updated 4 years ago
- This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily b…☆13Mar 28, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Disposable and resilient red team infrastructure with Terraform☆278Feb 1, 2019Updated 7 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆16May 15, 2020Updated 5 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆18May 29, 2021Updated 4 years ago
- Pull secrets from an AWS environment☆67Feb 2, 2020Updated 6 years ago
- SecTalks socially authored website☆20Jul 23, 2025Updated 9 months ago
- offensive notes & resources☆43Apr 7, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- Security cheat sheets for different language and platforms☆18Dec 31, 2023Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆109Jan 24, 2024Updated 2 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆58Apr 20, 2026Updated last week
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Windows internals and exploitation tricks☆116Mar 28, 2026Updated last month
- ☆14Aug 28, 2016Updated 9 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- ☆17Sep 2, 2021Updated 4 years ago