☆27Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for Red-teaming
Users that are interested in Red-teaming are comparing it to the libraries listed below
Sorting:
- List of red team resources☆100Nov 21, 2017Updated 8 years ago
- The following repo holds all scripts, apps, and documentation for InfoSec Red Team related activities.☆19Jun 24, 2020Updated 5 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- Python Automation☆13May 19, 2021Updated 4 years ago
- 快速获取图片的GPS和其拍摄地理位置☆20Feb 17, 2019Updated 7 years ago
- Simple shell script for automated domain recognition with some tools☆20Mar 9, 2019Updated 6 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆25Dec 2, 2025Updated 2 months ago
- ☆21Jul 13, 2022Updated 3 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Useful Github Dorks for BugBounty -☆68Jan 1, 2023Updated 3 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- Go shellcode loader that combines multiple evasion techniques☆389Jun 21, 2023Updated 2 years ago
- ☆32Jun 1, 2024Updated last year
- Poc Collected for study and develop☆30Jul 2, 2020Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- 收集规则☆30Dec 8, 2022Updated 3 years ago
- Open Redirect scanner - (out of date)☆28Nov 27, 2022Updated 3 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆32Jan 4, 2022Updated 4 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Jun 8, 2018Updated 7 years ago
- A Node.js and Express.js backend template tailored for beginner developers. It offers a structured foundation, essential tools, and best …☆14Aug 18, 2024Updated last year
- ☆10Jul 21, 2021Updated 4 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Jun 23, 2024Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Dec 31, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- ☆11Dec 5, 2020Updated 5 years ago
- ☆10Jun 13, 2024Updated last year
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- A tool to test working urls.☆43Nov 17, 2020Updated 5 years ago
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆31Feb 22, 2026Updated last week