ihebski / A-Red-Teamer-diariesView external linksLinks
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
☆1,897Oct 29, 2025Updated 3 months ago
Alternatives and similar repositories for A-Red-Teamer-diaries
Users that are interested in A-Red-Teamer-diaries are comparing it to the libraries listed below
Sorting:
- Tools & Interesting Things for RedTeam Ops☆2,250Feb 10, 2026Updated last week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,487Jan 18, 2026Updated 3 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,641Aug 28, 2025Updated 5 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,637Jul 27, 2025Updated 6 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,152Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,694Jul 6, 2025Updated 7 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,249Apr 12, 2024Updated last year
- Azure Security Resources and Notes☆1,707Feb 2, 2026Updated 2 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,403Dec 20, 2025Updated last month
- Red Team Cheatsheet in constant expansion.☆1,256Dec 28, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,487Aug 22, 2024Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆8,493Mar 18, 2025Updated 10 months ago
- game of active directory☆7,437Jul 16, 2025Updated 7 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,366Oct 27, 2023Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,495Dec 21, 2023Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,115Sep 29, 2025Updated 4 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,143Mar 28, 2025Updated 10 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,895Jun 27, 2023Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,629Aug 6, 2022Updated 3 years ago
- OSWE, OSEP, OSED, OSEE☆3,761Jan 2, 2026Updated last month
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,867Aug 18, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,368Oct 22, 2025Updated 3 months ago
- ☆1,071May 18, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,442Oct 1, 2025Updated 4 months ago
- ☆412Dec 14, 2023Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,258Dec 9, 2025Updated 2 months ago
- List of Awesome Red Teaming Resources☆7,757Dec 28, 2023Updated 2 years ago
- ☆1,667Apr 14, 2025Updated 10 months ago
- The swiss army knife of LSASS dumping☆2,069Sep 17, 2024Updated last year
- ☆714Mar 22, 2024Updated last year
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,145Jul 19, 2024Updated last year
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,850Feb 3, 2026Updated 2 weeks ago
- Extract credentials from lsass remotely☆2,178Dec 24, 2025Updated last month
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,294Updated this week
- ☆843Jan 12, 2026Updated last month
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Oct 7, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,048Dec 11, 2024Updated last year
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago