List of Red Team Resources
☆18Jun 16, 2020Updated 5 years ago
Alternatives and similar repositories for rt-reading
Users that are interested in rt-reading are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jul 20, 2022Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- ☆543Mar 15, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 4 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- Simple APPLocker bypass summary☆46Oct 22, 2018Updated 7 years ago
- Bulk Xbox Live Gamertag availability checker.☆14Mar 9, 2019Updated 7 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆19Apr 11, 2022Updated 4 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Jan 23, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆22May 29, 2020Updated 5 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 4 years ago
- A library to make HTTP requests with the Windows winhttp API☆25Feb 8, 2024Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆194Nov 18, 2024Updated last year
- ☆11Dec 7, 2025Updated 4 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A React Based Kubernetes YAML Manifest Sanity Checker☆12Mar 3, 2025Updated last year
- CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware☆15Jul 2, 2020Updated 5 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Jun 11, 2025Updated 10 months ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆19Apr 17, 2020Updated 6 years ago
- ☆243Nov 21, 2024Updated last year
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Objective C dylibHijackScanner and analysis tool☆41Jul 12, 2023Updated 2 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Feb 9, 2018Updated 8 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 5 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- A proof of concept for a clickjacking attack on macOS.☆98Feb 12, 2024Updated 2 years ago
- ☆32Sep 23, 2022Updated 3 years ago
- Get a stable, canonical version of any URL, with DNS and HTTPS checks, redirects, tracker stripping, and canonical link extraction!☆13Updated this week
- ☆65Jan 17, 2026Updated 3 months ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago