Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for redteaming
redteaming
x
237 search results found
Tldhunt
⭐
96
Domain Availability Checker
Secfiles
⭐
94
My files for security assessments, bug bounty and other security related stuff
Xsubfind3r
⭐
92
A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.
Mediator
⭐
91
An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.
Lazypariah
⭐
90
A tool for generating reverse shell payloads on the fly.
Turbo Attack
⭐
87
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
Subevil
⭐
85
SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.
Sub Drill
⭐
82
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Window Rat
⭐
80
The purpose of this tool is to test the window10 defender protection and also other antivirus protection.
Xcrawl3r
⭐
79
A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.
Controlcompass.github.io
⭐
76
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
Klezvirus.github.io
⭐
75
CyberSec Blog
Bof Dll Inject
⭐
75
Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.
Suass
⭐
75
one-stop resource for all things offensive security.
Nativepayload_cbt
⭐
74
NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
Tcc Clickjacking
⭐
70
A proof of concept for a clickjacking attack on macOS.
Tdc2023 Starter Kit
⭐
69
This is the starter kit for the Trojan Detection Challenge 2023 (LLM Edition), a NeurIPS 2023 competition.
Kernel Mii
⭐
69
Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.
Hacknetics
⭐
67
Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and high level strategy. One simple clone and you have access to some of the most popular tools used for pentesting.
Pentest Bookmarkz
⭐
67
A collection of useful links for Pentesters
Os Cfdb
⭐
66
Open Source - Common Findings DataBase (JSON & MD)
Ipv6teal
⭐
65
👋 Stealthy data exfiltration via IPv6 covert channel
Reversepowershell
⭐
63
Functions that can be used to gain Reverse Shells with PowerShell
Alignmentsurvey
⭐
59
AI Alignment: A Comprehensive Survey
Red Team Advent Of Code
⭐
59
Red Teaming / Pentesting challenges for my Advent-Of-Code 2021.
Fudshell
⭐
57
An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal
Wicrackfi
⭐
56
Python Script to help/automate the WiFi hacking exercises.
Powerexfil
⭐
56
A collection of data exfiltration scripts for Red Team assessments.
Redherd Framework
⭐
54
RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.
Middleout
⭐
54
A small .NET compression utility
G3nius Tools Sploit
⭐
53
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
Signaturegate
⭐
52
Weaponized HellsGate/SigFlip
Cybersecurity Red Team
⭐
49
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
Triples
⭐
48
Extracting Syscall Stub, Modernized
Nimalathatep
⭐
47
Nim Payload Generation
Sherlock
⭐
46
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Process Hollowing Redteamops
⭐
46
Red Team Operation's Defense Evasion Technique.
Ezea
⭐
45
EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
Amd Ryzen Master Driver V17 Exploit
⭐
41
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).
Redteam
⭐
41
One line PS scripts that may come handy during your network assesment
Hackthebox Reporting
⭐
41
Hack The Box CPTS, CBBH Exam and Lab Reporting / Note-Taking Tool
Htkit
⭐
41
Information Gathering Simplified.
Offensive Snippets
⭐
40
A repository with my code snippets for research/education purposes.
Hackarsenaltoolkit
⭐
39
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Dir2json
⭐
39
Tool for efficient directory enumeration
Red Tldr Db
⭐
38
Red TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation and try it out.
Acheron
⭐
38
indirect syscalls for AV/EDR evasion in Go assembly
Pitch
⭐
38
The initial conversation slides and menu of scenarios
Monarch
⭐
36
Monarch - The Adversary Emulation Toolkit
Yggdrasil
⭐
36
Automation script to download tools and configurate kali linux for various cybersecurity categories
Pyfud
⭐
36
CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)
All In One Cybersecurity Resources
⭐
36
List of CyberSecurity Resources and some different Sub-Sets of CyberSecurity
Nativepayload_pe1
⭐
35
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs]
Ensemble
⭐
33
A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting to scan multiple bug bounty programs simultaneously, on a recurring basis.
Lolbin Poc
⭐
32
Small PoC of using a Microsoft signed executable as a lolbin.
Videos Bypassingavsbycsharp
⭐
31
Video files for eBook: "Bypassing AVs by C#.NET Programming"
Sharpleftovers
⭐
30
A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup
Gcc Stealer
⭐
30
Google Chrome Cookies Stealer. Steals Chrome cookies
Pentesting Mind Map
⭐
30
Web Hacking and Red Teaming MindMap
Fairplay
⭐
30
Artifact monitoring that ensures fairplay
Red Teaming Ttps
⭐
29
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Defcon30
⭐
26
DEFCON30 Talk Material, References and Extra Bits
Certexfil
⭐
25
Exfiltration based on custom X509 certificates
Krakenrdi
⭐
24
Rapid Deployment Infrastructure for Red Teaming and Penetration Testing
Responder Parser
⭐
23
Most Responder's configuration power in your hand
Malicious Rmqr Codes
⭐
23
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
Ddwpasterecon
⭐
22
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can collect and analyse data from these indexed pastesites to better protect against unknown threats.
Rfid Gooseneck
⭐
21
Full Build Guide for making your own RFID Gooseneck Long Range Reader!
Stegocracker
⭐
19
Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice any change in the image or audio file. However, your secret message will be inside the original image or audio file
Dpapick
⭐
19
Bof Builder
⭐
18
C# .Net 5.0 project to build BOF (Beacon Object Files) in mass
Bca Phantom
⭐
17
A multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
Maliketh
⭐
17
🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python
Thecollective
⭐
16
The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/TheCollective #infosec #redteaming #pentest
Webhacking
⭐
16
This repo contain Myanmar Pentster Community web-hacking class resources and published with education purpose.
Osintbookmarks
⭐
16
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Red Book
⭐
16
The Red-book: The Art of Offensive CyberSecurity
Cmstplua Uac Bypass
⭐
16
Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.
Offensiveactivedirectory
⭐
15
A set of instructions, command and techniques that help during an Active Directory Assessment.
Redbloodc2
⭐
15
Jalsi
⭐
15
JALSI - Just Another Lame Shellcode Injector
Connect
⭐
14
Command and Control Framework
Moonshot
⭐
14
Moonshot - A simple and modular tool to evaluate and red-team any LLM application.
Jasmin Ransomware
⭐
14
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Palinka_c2
⭐
14
Just another useless C2 occupying space in some HDD somewhere.
Zwatcher
⭐
14
"zwatcher is a lightweight bash script for monitoring sub/domains or a list of sub/domains and javascript files. It compares HTTP status codes and content length to detect changes and notifies the user when any modifications occur. Easily keep track of your domains' health and security with zwatcher."
Evasion Adventures Files
⭐
14
Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"
Wmiexec2
⭐
14
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
Urlyzer
⭐
13
urlyzer is a URL parsing analysis tool.
Blueprint
⭐
12
Templating with sinister modules
Spotexfil
⭐
12
A simple way to exfiltrate data using spotify API
Useragent Fuzz Lib
⭐
12
User-agent Fuzzing Library. This repository holds data of all the user agents in the `user_agents.json` file, which can be used directly with any tool that can parse json format.
Rti Toolkit
⭐
12
Remote Template Injection Toolkit
Mavoc
⭐
12
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
Arducky
⭐
12
Arducky - Arduino Ducky Script Interpreter
Addreferencedotredteam
⭐
12
A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collection of C# red team projects in 1 Lib.
Crimson Spray
⭐
12
A lockout aware password sprayer
Redelk Kibana App
⭐
12
Kibana app for RedELK
Blackheart
⭐
11
BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender restrictions. (FOR EDUCATIONAL PURPOSES!!)
Red Team Tools
⭐
11
Repo containing cracked red teaming tools.
101-200 of 237 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.