☆2Apr 23, 2024Updated last year
Alternatives and similar repositories for red-team-infra
Users that are interested in red-team-infra are comparing it to the libraries listed below
Sorting:
- Redis RCE through Lua Sandbox Escape vulnerability☆10Sep 2, 2022Updated 3 years ago
- ☆22Mar 17, 2025Updated 11 months ago
- ☆11Nov 5, 2018Updated 7 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- some sploits☆19Sep 20, 2024Updated last year
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本☆19Apr 1, 2025Updated 10 months ago
- ☆13Nov 29, 2024Updated last year
- You can gather useful information accounts by username across all types networks ( which also include social media)☆27Oct 19, 2023Updated 2 years ago
- Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.☆22Aug 31, 2023Updated 2 years ago
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is…☆24May 18, 2025Updated 9 months ago
- The Certified in Cybersecurity℠ (CC) is for anyone interested in gaining a basic understanding of cybersecurity concepts. This is an ent…☆25Mar 22, 2025Updated 11 months ago
- ☆29Feb 16, 2022Updated 4 years ago
- Python exploit for the vsftpd 2.3.4☆25Jul 24, 2024Updated last year
- ☆24Jan 24, 2025Updated last year
- ☆26Sep 1, 2022Updated 3 years ago
- Code injection via Asynchronous Procedure Calls to bypass Windows defenses. Mapped to MITRE ATT&CK T1055.004.(Process Injection: Asynchro…☆33Oct 11, 2024Updated last year
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- ☆32Nov 3, 2020Updated 5 years ago
- ☆36Nov 30, 2023Updated 2 years ago
- The full SysInternals Suite☆27Feb 14, 2017Updated 9 years ago
- Frontend Mentor Challenges☆25Jun 4, 2024Updated last year
- ☆28May 25, 2021Updated 4 years ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆30Mar 18, 2025Updated 11 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- ☆71Jun 3, 2025Updated 8 months ago
- Hacking Notes☆40Oct 27, 2025Updated 4 months ago
- Tool for extracting credentials locally stored by web browsers☆37Jun 25, 2022Updated 3 years ago
- ☆34Apr 16, 2022Updated 3 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Jun 24, 2023Updated 2 years ago
- tryhame rooms walkthrough☆58Feb 20, 2026Updated last week
- Vagrant provisioning scripts to create a simulated network environment for tabletop exercises☆42Jul 28, 2022Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Jul 13, 2021Updated 4 years ago