Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.
☆29Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for CSC-RedOps
Users that are interested in CSC-RedOps are comparing it to the libraries listed below
Sorting:
- Offensive Security OSWE Prep 2022☆76Sep 10, 2022Updated 3 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- ☆78Apr 25, 2023Updated 2 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆132Apr 24, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- ☆20Mar 21, 2024Updated last year
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 3 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Random OSINT idea tool thing☆24Jan 11, 2026Updated last month
- ⛏️ A simple page to mine monero using Coin hive☆22Sep 7, 2020Updated 5 years ago
- ☆29May 19, 2023Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- ☆27Feb 3, 2026Updated last month
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- Tools & Resources for Cyber Security Operations☆270May 19, 2025Updated 9 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- ☆24Feb 7, 2025Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated last month
- ☆30May 1, 2025Updated 10 months ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- Custom pentesting tools☆26Nov 17, 2020Updated 5 years ago
- A minimal SDK that lets an integrator add a Monero Miner using the Javascript miner created by CoinHive. The Monero Miner can be used wit…☆26Jul 27, 2018Updated 7 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆40Sep 16, 2021Updated 4 years ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago