vvswift / RedTeam-ArsenalLinks
Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulations, including custom beacons, malleable C2 profiles, aggressor scripts, advanced payload generation methods, as well as other evasion tools, tailored for red team operations and security research.
☆78Updated last month
Alternatives and similar repositories for RedTeam-Arsenal
Users that are interested in RedTeam-Arsenal are comparing it to the libraries listed below
Sorting:
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆124Updated 2 years ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129Updated 8 months ago
- Laravel RCE Exploitation Toolkit☆48Updated 2 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- ☆59Updated 9 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆97Updated 10 months ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆148Updated 2 weeks ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆175Updated 8 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 9 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- ☆75Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆90Updated 2 months ago
- ☆58Updated 7 months ago
- A real fake social engineering app☆130Updated 6 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆85Updated 7 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Updated 10 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆121Updated 7 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆215Updated last month
- Everything and anything related to password spraying☆151Updated last year
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆107Updated last month
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆151Updated 10 months ago
- ☆95Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated last year
- Decrypt Chromium based browser passwords with PowerShell.☆133Updated 2 months ago
- Repo for all my exploits/PoCs☆51Updated 8 months ago
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆65Updated last year
- This is an AD pentest tools collection☆59Updated last year
- ☆63Updated last month