Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2, evasion, etc).
☆87May 5, 2023Updated 2 years ago
Alternatives and similar repositories for red-team-playground
Users that are interested in red-team-playground are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆103Aug 14, 2025Updated 8 months ago
- Command & Control-Framework created for collaboration in python3☆324Aug 7, 2023Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆86Feb 26, 2023Updated 3 years ago
- ☆39May 20, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Materials for the workshop "Red Team Ops: Havoc 101"☆398Oct 6, 2024Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆233Oct 8, 2024Updated last year
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆153Oct 21, 2023Updated 2 years ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆573Feb 12, 2026Updated 2 months ago
- Single executable reverse SOCKS5 proxy written in Golang.☆151Apr 1, 2026Updated 3 weeks ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆14Jun 29, 2023Updated 2 years ago
- Tool for enumerating Active Directory environments☆48Aug 10, 2023Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Jun 6, 2023Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- A RedTeam Toolkit☆408Aug 14, 2025Updated 8 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆92Aug 11, 2024Updated last year
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- random code snippets, useful for getting started☆123Nov 29, 2025Updated 5 months ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- ☆28Mar 31, 2023Updated 3 years ago
- Red Teaming tools and techniques☆57Feb 18, 2023Updated 3 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 3 months ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Amsi Bypass payload that works on Windwos 11☆381Jul 30, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆322Aug 8, 2024Updated last year
- A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do s…☆14Jan 12, 2021Updated 5 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Mar 16, 2023Updated 3 years ago
- Labs & Code snippets for RRT on TTI☆40Nov 16, 2022Updated 3 years ago