ryanmrestivo / red-team
Notes, red team materials, testing tools, etc.
☆135Updated 5 months ago
Alternatives and similar repositories for red-team:
Users that are interested in red-team are comparing it to the libraries listed below
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆108Updated last year
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆264Updated 3 weeks ago
- MSSQL Database Attacker tool☆191Updated 2 years ago
- Awesome AV/EDR/XDR Bypass Tips☆263Updated last year
- A shellcode injection tool showcasing various process injection techniques☆134Updated last year
- PowerShell Asynchronous TCP Reverse Shell☆155Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆258Updated last year
- 「🛡️」AVs/EDRs Evasion tool☆94Updated 3 months ago
- Reverse shell that can bypass windows defender detection☆161Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆114Updated last year
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆52Updated 2 years ago
- ☆214Updated last year
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆123Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆395Updated 9 months ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆260Updated 2 years ago
- Shellcode launcher for AV bypass☆215Updated last year
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆110Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆231Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆105Updated last year
- CVE-2021-40444☆65Updated 3 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆196Updated 8 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- ☆406Updated last year
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆112Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆186Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆126Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆393Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year