yeyintminthuhtut / Red-Teaming-ToolkitLinks
A collection of open source and commercial tools that aid in red team operations.
☆11Updated 6 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below
Sorting:
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Updated 7 years ago
- ☆33Updated last year
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Updated 3 years ago
- Simple Karma Attack☆68Updated 5 years ago
- ☆53Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated this week
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 months ago
- ☆25Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Customized Kali Linux - Ansible playbook☆66Updated 5 years ago
- ☆15Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Updated 5 years ago
- Custom pentesting tools☆26Updated 5 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago