r0r0x-xx / Red-Team-OPS-Modern-Adversary
☆45Updated 4 years ago
Alternatives and similar repositories for Red-Team-OPS-Modern-Adversary:
Users that are interested in Red-Team-OPS-Modern-Adversary are comparing it to the libraries listed below
- ☆20Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated last month
- Web Hacking and Red Teaming MindMap☆70Updated 2 years ago
- ☆20Updated 2 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆45Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- Template used for my OSCP exam.☆27Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- ☆47Updated 7 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆24Updated 8 months ago
- You don't need wires to be connected☆40Updated 4 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- ☆22Updated 2 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- ☆47Updated 8 months ago
- ☆29Updated 3 years ago
- ☆64Updated last year
- ☆45Updated last month
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- Offensive Security Wireless Professional☆17Updated 4 years ago
- Buffer Overflows☆29Updated 4 years ago
- ☆18Updated 9 months ago
- ☆29Updated 5 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- OSCP Study Guide☆40Updated 2 years ago
- Command Execution exploiter with an auto connection handling☆34Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆50Updated 3 weeks ago