mishmashclone / yeyintminthuhtut-Awesome-Red-TeamingView external linksLinks
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
☆16Jan 15, 2022Updated 4 years ago
Alternatives and similar repositories for yeyintminthuhtut-Awesome-Red-Teaming
Users that are interested in yeyintminthuhtut-Awesome-Red-Teaming are comparing it to the libraries listed below
Sorting:
- ☆47Jan 1, 2018Updated 8 years ago
- ☆10May 15, 2020Updated 5 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- ☆16Jul 25, 2018Updated 7 years ago
- ☆13Jan 25, 2020Updated 6 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- Каталог нетсталкерских ресурсов, команд, инструментов, источников контента.☆11Nov 16, 2020Updated 5 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Jun 26, 2024Updated last year
- PC Park observer☆16Apr 14, 2024Updated last year
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- ☆17Jul 18, 2020Updated 5 years ago
- This async script is designed to get proxies from several sites and save it to a file.☆27Sep 30, 2021Updated 4 years ago
- ☆69May 3, 2021Updated 4 years ago
- Program to detect and remove the root level SSL certificates installed by NCALayer program☆14Jul 19, 2019Updated 6 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams☆599Feb 20, 2020Updated 5 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- This extension provides a way to discover NoSQL injection vulnerabilities.☆25Sep 7, 2025Updated 5 months ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆23Oct 29, 2020Updated 5 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆76Feb 5, 2026Updated last week
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 8 months ago
- Qiwi у тебя в терминале! (Бета версия)☆11May 5, 2021Updated 4 years ago
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated 2 weeks ago
- CSI SIEM☆109Dec 8, 2022Updated 3 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- Information Security Information From Web☆28Jul 31, 2025Updated 6 months ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 6 months ago
- Various wordlists for bruteforce☆36Nov 9, 2021Updated 4 years ago
- Automatic detection of deepfakes made on ThisPersonDoesNotExist.com☆35Nov 19, 2022Updated 3 years ago
- Android app that listens for incoming SMS text/data messages and conditionally sends an automatic reply containing GPS location data.☆74Nov 11, 2020Updated 5 years ago
- Zabbix Templates☆13Jul 24, 2020Updated 5 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- FTP Honeypot☆33Jan 22, 2024Updated 2 years ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆42Dec 4, 2023Updated 2 years ago