List of Red Team Repositories
☆17Feb 26, 2019Updated 7 years ago
Alternatives and similar repositories for wiki
Users that are interested in wiki are comparing it to the libraries listed below
Sorting:
- Python Library for ConfigExtractor☆15Updated this week
- ☆13Apr 17, 2018Updated 7 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- a bot for quickleft☆20Aug 9, 2011Updated 14 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated 11 months ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Feb 15, 2019Updated 7 years ago
- A CALDERA Plugin Template☆20Jan 7, 2026Updated last month
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 10 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Hopper plugin to analyze ObjC runtime structures in the dyld_shared_cache☆26Feb 26, 2021Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- A C# DLL to Dump LSA Secrets☆58Feb 5, 2018Updated 8 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 11, 2026Updated 2 weeks ago
- ☆22Apr 12, 2019Updated 6 years ago
- Discover which process execute a hunted binary inside macOS☆27Dec 15, 2021Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- ☆34Apr 5, 2017Updated 8 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆63Oct 29, 2024Updated last year
- Android Malware Tracker☆28Apr 7, 2024Updated last year
- A minimal malware analysis sandbox for macOS☆34Feb 15, 2023Updated 3 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Nov 27, 2017Updated 8 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- arm64 and arm64e dylib injector☆38Feb 6, 2024Updated 2 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago