v4resk / red-bookLinks
The Red-book: The Art of Offensive CyberSecurity
☆64Updated 2 weeks ago
Alternatives and similar repositories for red-book
Users that are interested in red-book are comparing it to the libraries listed below
Sorting:
- ☆73Updated last year
- ☆42Updated this week
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆75Updated 9 months ago
- Windows Privilege Escalation☆64Updated 3 years ago
- Tool for enumerating Active Directory environments☆47Updated last year
- Repo for all my exploits/PoCs☆51Updated last month
- ☆57Updated 7 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- ☆84Updated 4 months ago
- List of some AD tools I frequently use☆47Updated 2 weeks ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated 2 years ago
- My Favorite Offensive Security Scripts☆73Updated 2 months ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆88Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 5 months ago
- ☆85Updated 2 years ago
- CVE-2025-24016: RCE in Wazuh server! Remote Code Execution☆51Updated 4 months ago
- ☆35Updated 7 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Awesome Privilege Escalation☆111Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆53Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆110Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- ☆70Updated 3 months ago
- ☆34Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- ☆59Updated 8 months ago