☆13Aug 31, 2020Updated 5 years ago
Alternatives and similar repositories for Red-Team-Cheat-Sheet
Users that are interested in Red-Team-Cheat-Sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 5 years ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆36Feb 27, 2025Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- RCE exploit for attack chain in "A Saga of Code Executions on Zimbra" post☆36Oct 2, 2021Updated 4 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆19Feb 16, 2021Updated 5 years ago
- An Event Tracing for Windows (ETW) EventSource generator built on .Net Core 2.0☆11Dec 8, 2022Updated 3 years ago
- A substitute repository put up on public demand for the original Awesome WAF repository (https://github.com/0xInfection/Awesome-WAF) whic…☆12May 3, 2019Updated 6 years ago
- source code javascript by hoi dan it channel☆12Aug 29, 2021Updated 4 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Todos los comandos necesarios para aprobar el eJPT☆13Sep 28, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- ☆15Aug 26, 2025Updated 7 months ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆21Oct 31, 2018Updated 7 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 11 months ago
- Here is a collage of reverse engineering topics that I find interesting☆16Dec 10, 2017Updated 8 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- You can check credits card whether they are cvv or ccn or dead using sk keys.☆10Sep 20, 2022Updated 3 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Utilities for decrypting and hashing SolarWinds Orion credentials☆14Oct 25, 2018Updated 7 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆27Jan 18, 2023Updated 3 years ago
- Burp Suite Professional Edition .☆19Jul 24, 2025Updated 8 months ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- My entire hacker toolkit ready for to run on a vanilla Arch Linux installation.☆27Apr 10, 2023Updated 3 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 4 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Collection of different cybersecurity links and tools.☆21Dec 9, 2025Updated 4 months ago
- Windows for Red Teamers☆126Apr 18, 2022Updated 3 years ago
- Azure Templates for NetScaler☆16Mar 3, 2026Updated last month
- Cheatsheets☆19Jul 4, 2022Updated 3 years ago
- Small project to facilitate creation of .lnk payloads☆82Nov 18, 2022Updated 3 years ago
- DNS amplification PoC☆23Aug 9, 2020Updated 5 years ago
- A website that helps downloading comic chapters from Bilibili ONLINE and FREE!☆10Nov 21, 2021Updated 4 years ago