Red Teaming Tactics and Techniques
☆11Sep 11, 2020Updated 5 years ago
Alternatives and similar repositories for RedTeam-Tactics-and-Techniques
Users that are interested in RedTeam-Tactics-and-Techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Jul 19, 2020Updated 5 years ago
- Hack Cameras CCTV FREE☆17Aug 22, 2021Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Dec 9, 2019Updated 6 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- this is a tutorial to create open vpn clients for ubuntu☆19Apr 2, 2022Updated 3 years ago
- ☆17Mar 26, 2021Updated 5 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- activity-based modelling pipeline (for transport demand models)☆18Sep 23, 2025Updated 6 months ago
- Interview questions to screen offensive (red team/pentest) candidates☆12Apr 7, 2017Updated 8 years ago
- A github action to tunnel traffic into Github Workflow pipeline using ngrok☆13Apr 1, 2024Updated last year
- WebGPT is a library based on the OpenAI API and LangChain. It allows you to connect ChatGPT to the Internet without a seam to make reques…☆10Sep 28, 2023Updated 2 years ago
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Supporting data package for the Portfolio Optimization Book☆25Feb 17, 2025Updated last year
- Feed for OpenWrt targets not maintained in mainline anymore☆13Jun 5, 2025Updated 9 months ago
- Quick and dirty demonstration of Arduino IDE to ESP8266 turning on/off an RCSwitch via web browser☆12Dec 11, 2016Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- Development repository for the freebsd cookbook☆26Mar 2, 2026Updated 3 weeks ago
- RCS Anonymizer☆29Jul 6, 2015Updated 10 years ago
- An unofficial C# API for interacting with https://anonfile.com/☆10Jan 2, 2020Updated 6 years ago
- SIPP-Scenarios for IMS☆12Mar 21, 2018Updated 8 years ago
- Simple checker for ok.ru partial private data disclosure☆13Oct 5, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Grub-theme-creator is a project that automates the creation of a grub2 theme, using a bash script and settings files and resources☆17May 24, 2021Updated 4 years ago
- Toolbox for RGH/Jtag/Devkit Xbox 360☆22Jun 10, 2019Updated 6 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- collection of articles/books about programing☆588Dec 20, 2023Updated 2 years ago
- UISwitch implementation☆44Oct 6, 2011Updated 14 years ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- [Docker Cloud System Image] Provides a secure overlay network between nodes☆10Mar 20, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- dmg2img converter, used to flash DMG images on the fly on EtchDroid☆16Aug 17, 2018Updated 7 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆21May 23, 2022Updated 3 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- Demo of building gRPC services in Rust☆23Mar 10, 2023Updated 3 years ago
- iDevice Jailbreak Utilities☆20Dec 31, 2010Updated 15 years ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆54Aug 18, 2023Updated 2 years ago