mantvydasb / RedTeaming-Tactics-and-TechniquesLinks
Red Teaming Tactics and Techniques
☆4,271Updated 9 months ago
Alternatives and similar repositories for RedTeaming-Tactics-and-Techniques
Users that are interested in RedTeaming-Tactics-and-Techniques are comparing it to the libraries listed below
Sorting:
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,617Updated 6 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,493Updated 6 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,541Updated 9 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,278Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,100Updated 2 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,600Updated last week
- List of Awesome Red Teaming Resources☆7,262Updated last year
- The ultimate WinRM shell for hacking/pentesting☆4,860Updated 6 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,492Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,561Updated last month
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,595Updated last week
- Privilege Escalation Enumeration Script for Windows☆3,308Updated 3 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,591Updated 2 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,232Updated last year
- Windows Exploit Suggester - Next Generation☆4,446Updated this week
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,107Updated 4 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,610Updated last year
- A swiss army knife for pentesting networks☆8,745Updated last year
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,175Updated 2 years ago
- Trying to tame the three-headed dog.☆4,479Updated last month
- A tool to perform Kerberos pre-auth bruteforcing☆2,925Updated 9 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,721Updated last year
- A collaborative, multi-platform, red teaming framework☆3,707Updated this week
- ☆2,263Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆1,957Updated 2 years ago
- Linux privilege escalation auditing tool☆5,965Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,069Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,372Updated last year
- Monitor linux processes without root permissions☆5,460Updated 2 years ago
- A script that you can run in the background!☆2,851Updated 10 months ago