Issues to consider when planning a red team exercise.
☆15Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for redteam-plan
Users that are interested in redteam-plan are comparing it to the libraries listed below
Sorting:
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- A collection of some Powershell scripts and functions for building lab-environments☆19Feb 25, 2023Updated 3 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆97Nov 12, 2013Updated 12 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆56Dec 3, 2016Updated 9 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- A horizontal and vertical web content enumerator☆52Aug 15, 2018Updated 7 years ago
- A python based library to interact with .net webservices with net.tcp binding. Supports MC-NMF, MC-NMFTB and MS-NNS and contains a proxy …☆58Sep 2, 2020Updated 5 years ago
- This repo is all about myself coded exploit codes :)☆55Aug 27, 2019Updated 6 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- PDML importer for Burp Suite☆28Oct 20, 2020Updated 5 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Jul 3, 2018Updated 7 years ago