All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.
☆41Jul 21, 2020Updated 5 years ago
Alternatives and similar repositories for RedTeamCheatsheet
Users that are interested in RedTeamCheatsheet are comparing it to the libraries listed below
Sorting:
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- ☆13Oct 24, 2024Updated last year
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆41May 21, 2018Updated 7 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- Offline AI Security Assistant for Air-Gapped Pentesting☆65Feb 22, 2026Updated last week
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Jun 14, 2024Updated last year
- Cross Origin Resource Sharing MisConfiguration Scanner☆173Nov 17, 2021Updated 4 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- ☆22May 29, 2020Updated 5 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Feb 19, 2026Updated last week
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- Next generation fireprox AWS API endpoint creation utility.☆57Dec 12, 2022Updated 3 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Fast, compact and all-around subdomain enumeration tool written in Rust☆23Feb 14, 2022Updated 4 years ago
- The most complete and up-to-date repository for BladeRF and YateBTS compatibility☆29Apr 9, 2023Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 5 years ago
- Miscellaneous pentesting scripts for OSCP☆59Dec 3, 2018Updated 7 years ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- ☆119Jun 17, 2021Updated 4 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Mar 7, 2024Updated last year
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆22Jul 26, 2020Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago