sh4d3s / RedTeamCheatsheetLinks
All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.
β42Updated 5 years ago
Alternatives and similar repositories for RedTeamCheatsheet
Users that are interested in RedTeamCheatsheet are comparing it to the libraries listed below
Sorting:
- β150Updated 2 years ago
- πΉβ56Updated 3 years ago
- Python template to assist with buffer overflowsβ71Updated 5 years ago
- β32Updated last year
- Small easy to find cheat sheet for Active directory exploitationβ44Updated 5 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.β48Updated 5 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.β116Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.β85Updated 3 years ago
- A set of recipes useful in pentesting and red teaming scenariosβ145Updated 2 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP examβ26Updated 5 years ago
- Microsoft External Attack Toolβ179Updated 2 years ago
- A script I made to automate basic buffer overflow exploitation as much as possibleβ34Updated 5 years ago
- OSCP guide and Red Team assessment Guideβ35Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShellβ83Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.β120Updated 4 years ago
- Nessus Parserβ57Updated 7 years ago
- NessusV2 File Parserβ65Updated 3 years ago
- β28Updated 5 years ago
- OSCP Buffer Overflow in 30 minutesβ36Updated 6 years ago
- This reconissance tool is specific written for OSCP engagements.β56Updated 2 years ago
- Active Directory Lab for Penetration Testingβ53Updated 2 weeks ago
- β37Updated 6 years ago
- List of Repositoriesβ98Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundledβ145Updated last month
- β82Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internetβ66Updated last year
- Import Nmap scans to Cherrytreeβ37Updated 3 years ago
- Passive internal reconnaissance toolβ72Updated 2 years ago
- β28Updated 6 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObinβ¦β26Updated 4 years ago