vvswift / RedTeam-ArsenalLinks
Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulations, including custom beacons, malleable C2 profiles, aggressor scripts, advanced payload generation methods, as well as other evasion tools, tailored for red team operations and security research.
☆78Updated last month
Alternatives and similar repositories for RedTeam-Arsenal
Users that are interested in RedTeam-Arsenal are comparing it to the libraries listed below
Sorting:
- Laravel RCE Exploitation Toolkit☆55Updated 3 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆186Updated this week
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129Updated 8 months ago
- ☆58Updated 7 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆90Updated 2 months ago
- ☆59Updated 9 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Updated 10 months ago
- ☆76Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆86Updated 11 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆125Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆149Updated 7 months ago
- ☆96Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆179Updated 8 months ago
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆125Updated last year
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆151Updated 10 months ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆152Updated last week
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆85Updated 7 months ago
- SharePoint WebPart Injection Exploit Tool☆311Updated 2 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆82Updated 4 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Dark-Shell is a Tool for Generating ReverShell File☆116Updated 3 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- ☆95Updated 7 months ago
- Everything and anything related to password spraying☆151Updated last year
- ☆65Updated last year
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆107Updated 2 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Updated last month