rosonsec / RedTeamLinks
Red Team Resources
☆60Updated 6 years ago
Alternatives and similar repositories for RedTeam
Users that are interested in RedTeam are comparing it to the libraries listed below
Sorting:
- Extensible Red Team Framework☆111Updated 5 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- ☆98Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 6 months ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- ☆122Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- ☆14Updated 7 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- API testing tool written with Python☆56Updated 8 years ago
- ☆51Updated 9 months ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- Samba, NFS shares spider and grepper☆70Updated 6 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago