☆17Oct 21, 2023Updated 2 years ago
Alternatives and similar repositories for redteamtips
Users that are interested in redteamtips are comparing it to the libraries listed below
Sorting:
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆17Jan 9, 2025Updated last year
- Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet☆13Dec 9, 2018Updated 7 years ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆85Feb 9, 2026Updated 3 weeks ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆18Sep 14, 2017Updated 8 years ago
- Rainbow table generation & lookup tools.☆31Dec 17, 2025Updated 2 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated last month
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- ☆44Jul 5, 2024Updated last year
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- ☆54Feb 12, 2026Updated 2 weeks ago
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- LDAP Enumeration Tool for Pentesters☆48Apr 22, 2025Updated 10 months ago
- ☆23Apr 28, 2024Updated last year
- ☆53Oct 10, 2023Updated 2 years ago
- ☆94May 26, 2023Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- ☆27Nov 7, 2023Updated 2 years ago
- A BOF to enumerate system process, their protection levels, and more.☆125Nov 27, 2024Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 3 months ago
- ☆106Sep 12, 2024Updated last year
- This repository implements Threadless Injection in C☆172Dec 23, 2023Updated 2 years ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆210Aug 21, 2025Updated 6 months ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- BOF to decrypt Signal Desktop chat logs☆71Feb 20, 2025Updated last year
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆86Feb 16, 2026Updated 2 weeks ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago