totekuh / red-toolkitView external linksLinks
A toolkit for your red team operations
☆34Oct 24, 2021Updated 4 years ago
Alternatives and similar repositories for red-toolkit
Users that are interested in red-toolkit are comparing it to the libraries listed below
Sorting:
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆18Jan 31, 2024Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- ☆17Mar 6, 2023Updated 2 years ago
- ☆37Jun 9, 2021Updated 4 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated last month
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆19Sep 28, 2024Updated last year
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 2 years ago
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 2 months ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆24Jul 5, 2023Updated 2 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 9 months ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Jan 4, 2025Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆70May 20, 2025Updated 8 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆57Dec 15, 2025Updated 2 months ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- Collection of BOFs for Cobalt Strike☆33Mar 28, 2023Updated 2 years ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- Car Hacking Village Philippines Repository☆44Oct 2, 2025Updated 4 months ago
- Hacks for a better google cloud shell experience☆36Oct 15, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Feb 13, 2025Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- ☆11May 1, 2024Updated last year
- Deploy Kubernetes Helm Charts for Check Point CloudGuard☆19Oct 21, 2025Updated 3 months ago
- ☆12Sep 9, 2023Updated 2 years ago
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 6 months ago
- a mock CISSP exam test simulator using aggregated questions from online sources.☆32Jun 11, 2020Updated 5 years ago
- ☆39Aug 13, 2021Updated 4 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- Sample code for finding AWS Account ID of an S3 bucket.☆49Feb 23, 2024Updated last year
- ☆13Jan 29, 2026Updated 2 weeks ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago