All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.
☆41Jul 21, 2020Updated 5 years ago
Alternatives and similar repositories for RedTeamCheatsheet
Users that are interested in RedTeamCheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- 主要放一些关于域内安全和红队攻防的学习和研究记录☆37Jun 4, 2019Updated 6 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆14Nov 26, 2017Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- ☆16Dec 16, 2021Updated 4 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Manage AWS secrets using Slack slash commands☆14Jul 25, 2023Updated 2 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- ☆119Jun 17, 2021Updated 4 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- ☆13Oct 24, 2024Updated last year
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- ☆97Feb 18, 2025Updated last year
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Automatted Purple Team Script☆30Oct 23, 2020Updated 5 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆172Nov 17, 2021Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.☆12May 28, 2021Updated 4 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated this week
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- A collection of offensive Nim example code☆74Dec 21, 2021Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆22Jul 26, 2020Updated 5 years ago