mantvydasb / RedTeaming-Tactics-and-TechniquesLinks
Red Teaming Tactics and Techniques
☆4,474Updated last year
Alternatives and similar repositories for RedTeaming-Tactics-and-Techniques
Users that are interested in RedTeaming-Tactics-and-Techniques are comparing it to the libraries listed below
Sorting:
- Wiki to collect Red Team infrastructure hardening resources☆4,432Updated 4 months ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,786Updated 6 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,629Updated 5 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,632Updated 6 months ago
- List of Awesome Red Teaming Resources☆7,736Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,693Updated 6 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,886Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,468Updated 2 weeks ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,019Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,285Updated last month
- The ultimate WinRM shell for hacking/pentesting☆5,229Updated 3 weeks ago
- ☆2,364Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆4,264Updated this week
- Privilege Escalation Enumeration Script for Windows☆3,658Updated last week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,596Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,090Updated 4 months ago
- Trying to tame the three-headed dog.☆4,849Updated 2 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,379Updated 2 years ago
- Windows Exploit Suggester - Next Generation☆4,750Updated this week
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,530Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,896Updated 3 months ago
- Windows / Linux Local Privilege Escalation Workshop☆2,041Updated 3 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,710Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,453Updated last year
- A swiss army knife for pentesting networks☆9,047Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,241Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,419Updated 3 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,832Updated 2 years ago
- Tools & Interesting Things for RedTeam Ops☆2,248Updated 7 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,135Updated 10 months ago