vvswift / RedTeam-ArsenalLinks
Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulations, including custom beacons, malleable C2 profiles, aggressor scripts, advanced payload generation methods, as well as other evasion tools, tailored for red team operations and security research.
β69Updated this week
Alternatives and similar repositories for RedTeam-Arsenal
Users that are interested in RedTeam-Arsenal are comparing it to the libraries listed below
Sorting:
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromiseβ101Updated last year
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ90Updated 2 weeks ago
- Repo for all my exploits/PoCsβ53Updated 6 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ94Updated 7 months ago
- β73Updated 10 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,β¦β214Updated 7 months ago
- List of some AD tools I frequently useβ51Updated 3 weeks ago
- CVE-2025-49144 PoC for security researchers to test and try.β84Updated 5 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).β16Updated 2 months ago
- Laravel RCE Exploitation Toolkitβ48Updated 3 weeks ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β84Updated 9 months ago
- This is an AD pentest tools collectionβ59Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.β38Updated 7 months ago
- β65Updated last year
- A fast subdomain takeover toolβ85Updated 2 years ago
- Smart keylogging capability to steal SSH Credentials including password & Private Keyβ147Updated 8 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β119Updated 5 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AVβ126Updated 6 months ago
- β59Updated 7 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- β87Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.β126Updated last year
- GeoServer Remote Code Executionβ85Updated 7 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)β41Updated 9 months ago
- Awesome Privilege Escalationβ137Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingβ203Updated 8 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hostsβ170Updated 6 months ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and β¦β51Updated last week