r3p3r / yeyintminthuhtut-Awesome-Red-TeamingView external linksLinks
☆47Jan 1, 2018Updated 8 years ago
Alternatives and similar repositories for yeyintminthuhtut-Awesome-Red-Teaming
Users that are interested in yeyintminthuhtut-Awesome-Red-Teaming are comparing it to the libraries listed below
Sorting:
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Jan 15, 2022Updated 4 years ago
- A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams☆599Feb 20, 2020Updated 5 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 5 years ago
- ☆13Jan 25, 2020Updated 6 years ago
- ☆209Oct 23, 2022Updated 3 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆945Feb 26, 2021Updated 4 years ago
- Каталог нетсталкерских ресурсов, команд, инструментов, источников контента.☆11Nov 16, 2020Updated 5 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Nov 7, 2020Updated 5 years ago
- ☆10Aug 21, 2024Updated last year
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Jun 26, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 2 months ago
- PC Park observer☆16Apr 14, 2024Updated last year
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- ☆17Jul 18, 2020Updated 5 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Program to detect and remove the root level SSL certificates installed by NCALayer program☆14Jul 19, 2019Updated 6 years ago
- ☆102Nov 3, 2019Updated 6 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Mar 30, 2021Updated 4 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- List of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will fa…☆66Mar 28, 2017Updated 8 years ago
- A python command line reverse geocoding location request and response tool based on the coordinates of cell phone towers pinged by a user…☆23Oct 29, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- ☆482Aug 12, 2022Updated 3 years ago
- A quick script to install google on linux☆22Jan 23, 2022Updated 4 years ago
- Java network leaks detection utility with easy configurable algorithms☆20Mar 21, 2017Updated 8 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,198Oct 23, 2022Updated 3 years ago