v4resk / red-bookLinks
The Red-book: The Art of Offensive CyberSecurity
☆58Updated last week
Alternatives and similar repositories for red-book
Users that are interested in red-book are comparing it to the libraries listed below
Sorting:
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated 8 months ago
- ☆72Updated last year
- ☆40Updated this week
- ☆84Updated 3 months ago
- Bad scripts I made doing CTF's☆21Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆96Updated 2 months ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated 2 years ago
- Repo for all my exploits/PoCs☆51Updated last month
- ☆54Updated 4 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆66Updated this week
- PowerShell Obfuscator☆178Updated last year
- My Favorite Offensive Security Scripts☆71Updated last month
- Windows Privilege Escalation☆64Updated 3 years ago
- Inject RDPThief into memory with PowerShell.☆64Updated 4 months ago
- List of some AD tools I frequently use☆47Updated 4 months ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated 2 years ago
- This is an AD pentest tools collection☆57Updated 11 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- ☆59Updated 8 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆86Updated 6 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆88Updated 11 months ago
- ☆85Updated 4 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆45Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 7 months ago
- Automate converting webshells into reverse shells.☆69Updated 2 months ago