rosonsec / RedTeam
Red Team Resources
☆59Updated 6 years ago
Alternatives and similar repositories for RedTeam:
Users that are interested in RedTeam are comparing it to the libraries listed below
- ☆98Updated 6 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 5 months ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆74Updated 7 years ago
- ☆51Updated 8 months ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- WhiteBox CMS analysis☆69Updated last year
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Web Filter External Enumeration Tool (WebFEET)☆76Updated 10 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- ☆122Updated 7 years ago
- ☆59Updated 4 years ago
- Plaintext Password harvesting from Azure Windows VMs☆67Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 2 years ago
- Discover target social media profiles☆81Updated 2 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago