Custom mini tools during Red Teaming engagements
☆23Jan 20, 2026Updated last month
Alternatives and similar repositories for Mini-Tools
Users that are interested in Mini-Tools are comparing it to the libraries listed below
Sorting:
- Cobalt Strike random C2 Profile generator☆16Nov 10, 2025Updated 3 months ago
- Sniffing files generator☆61Feb 24, 2025Updated last year
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆21Jan 8, 2026Updated last month
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated last year
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- Homemade Aggressor scripts kit for Cobalt Strike☆93Nov 25, 2025Updated 3 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- OSCP Methodology☆57Sep 6, 2023Updated 2 years ago
- ☆25Jun 2, 2023Updated 2 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Dec 11, 2024Updated last year
- Nim process hollowing loader☆62Jul 22, 2025Updated 7 months ago
- ☆33Jan 23, 2025Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated last month
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆64Oct 16, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 10 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Sharing Various Things☆22Jun 28, 2022Updated 3 years ago