Red Teaming utilities that I can open source. Used in various tests and CTFS
☆12Aug 19, 2024Updated last year
Alternatives and similar repositories for Redteam-Toolbox
Users that are interested in Redteam-Toolbox are comparing it to the libraries listed below
Sorting:
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆17May 22, 2019Updated 6 years ago
- Read my blog for more info -☆31Apr 27, 2021Updated 4 years ago
- Non organized Cpp code files I used for my research on Windows☆28Aug 9, 2020Updated 5 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Privilege escalation using dmidecode☆21May 6, 2019Updated 6 years ago
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Aug 20, 2024Updated last year
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- A driver created to bypass the anti-cheat and r/w memory through it☆15Aug 3, 2024Updated last year
- ☆10Sep 3, 2021Updated 4 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- ld_preload userland rootkit☆35Dec 13, 2020Updated 5 years ago
- 🤖 Configuración de nvim para Windows☆10Oct 26, 2022Updated 3 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 9 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Another linux ELF packer to evade hash detection.☆35Oct 22, 2021Updated 4 years ago
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- Script spam sms termux☆14Aug 24, 2020Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- ☆10Sep 20, 2020Updated 5 years ago
- New Tool To Unlock Hc Files Decryptor for HTTP Custom configuration files (LAPSCA)☆14Feb 16, 2023Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Tracking Google Enterprise Android Devices☆21Updated this week
- Analyze json logs in realtime☆14Feb 15, 2021Updated 5 years ago
- Easiest way to reset your debian based linux back to stock on the terminal☆11Jan 7, 2019Updated 7 years ago
- A collection of EMV tools and utilities for PHP 5.3+☆12Apr 16, 2014Updated 11 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- A Go Wrapper for JQ☆12Nov 1, 2019Updated 6 years ago
- Código de @Cadibot en Telegram☆10Jan 11, 2026Updated last month