thezimtex / red-teamView external linksLinks
☆16Feb 10, 2020Updated 6 years ago
Alternatives and similar repositories for red-team
Users that are interested in red-team are comparing it to the libraries listed below
Sorting:
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 2 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆45Jan 14, 2026Updated last month
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 10 months ago
- ☆16Apr 21, 2023Updated 2 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- Android Remote Access Trojan Binder☆15Jun 27, 2025Updated 7 months ago
- Malware Dump☆21Dec 24, 2016Updated 9 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆86Aug 2, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆28Nov 14, 2022Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- Just another EDR killer☆94Jan 21, 2026Updated 3 weeks ago
- ☆83May 19, 2024Updated last year
- ☆10Sep 3, 2021Updated 4 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ManageEngine OpManager Decryption Tools☆32Sep 6, 2022Updated 3 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- ☆14Feb 19, 2023Updated 2 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- ☆10Mar 11, 2024Updated last year
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Windows 7 Professional 7601 Service Pack 1 is vulnerable to eternalblue exploit and while exploiting this myself i ran into a number of i…