vvswift / RedTeam-ArsenalLinks
Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulations, including custom beacons, malleable C2 profiles, aggressor scripts, advanced payload generation methods, as well as other evasion tools, tailored for red team operations and security research.
☆76Updated 2 weeks ago
Alternatives and similar repositories for RedTeam-Arsenal
Users that are interested in RedTeam-Arsenal are comparing it to the libraries listed below
Sorting:
- Laravel RCE Exploitation Toolkit☆49Updated 2 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 8 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated last month
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆95Updated 9 months ago
- ☆57Updated 8 months ago
- ☆55Updated 6 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆85Updated 6 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆103Updated 2 years ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆209Updated 3 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆189Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆219Updated 8 months ago
- ☆75Updated 11 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 9 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆188Updated 3 weeks ago
- ☆65Updated last year
- ☆94Updated last year
- Repo for all my exploits/PoCs☆53Updated 8 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆175Updated 7 months ago
- This is an AD pentest tools collection☆59Updated last year
- List of some AD tools I frequently use☆56Updated 2 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆84Updated 10 months ago
- Awesome Privilege Escalation☆139Updated 3 years ago
- A real fake social engineering app☆129Updated 5 months ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆104Updated last month
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆150Updated 9 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆122Updated 6 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated last year
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Updated 9 months ago