Red Team Resources
☆60Dec 27, 2018Updated 7 years ago
Alternatives and similar repositories for RedTeam
Users that are interested in RedTeam are comparing it to the libraries listed below
Sorting:
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams☆600Feb 20, 2020Updated 6 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Sep 22, 2018Updated 7 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- ☆13Oct 12, 2017Updated 8 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- This script is a multi-threaded Okta password sprayer.☆71Jan 5, 2024Updated 2 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,146Nov 19, 2024Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,068Apr 26, 2020Updated 5 years ago
- ☆19Mar 16, 2021Updated 4 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- linux内核提权后门模块demo☆36Jun 11, 2019Updated 6 years ago
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Frequency domain method to determine band occupancy and modulation parameters for an ensemble of communication signals☆12Aug 24, 2017Updated 8 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- 尝试恢复乱码☆21Feb 3, 2021Updated 5 years ago
- Ex-pv8's☆64Aug 28, 2019Updated 6 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Curriculum, exercises, and teaching materials for elm training.☆10Jun 21, 2020Updated 5 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- ☆10Apr 11, 2023Updated 2 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 5 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago