scumdestroy / 100-RedTeam-ProjectsLinks
Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/100-redteam-projects]
☆14Updated last year
Alternatives and similar repositories for 100-RedTeam-Projects
Users that are interested in 100-RedTeam-Projects are comparing it to the libraries listed below
Sorting:
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 3 years ago
- BackdoorSim: An Educational into Remote Administration Tools☆114Updated last year
- hacking tools☆14Updated 2 years ago
- WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass☆80Updated 2 years ago
- D3Ext's Forward Shell☆120Updated 2 years ago
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆62Updated 8 months ago
- List of XSS Payloads☆15Updated 3 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- ☆14Updated last year
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Updated 2 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated 2 years ago
- Personally developed tools for buffer overflow attacks☆24Updated 3 years ago
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆33Updated 8 months ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆105Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆54Updated 2 years ago
- gitbook of all pentesting knowledge☆21Updated 2 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆75Updated last week
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated 2 years ago
- An automation tool to install the most popular tools for bug bounty or pentesting.☆124Updated 2 weeks ago
- POC exploit for CVE-2015-10141☆30Updated 2 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆110Updated last month
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆51Updated 11 months ago
- Un simple bypass de uac con c# y powershell☆21Updated last year
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated 2 years ago
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆32Updated last year
- Trends Website (URL) from Twitter hackers.☆105Updated this week
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆47Updated 2 years ago
- CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit☆25Updated 6 months ago