Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for redteaming
redteaming
x
237 search results found
Docker
⭐
11
Cervantes plataform docker repository
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Dexter
⭐
10
Data EXfiltration TestER
Restless
⭐
10
A light in-memory implant in C# that bypasses Windows Firewall and Defender.
Hack_hard
⭐
10
A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
Havocnotion
⭐
10
A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel.
Hacking Utilidades
⭐
9
Utilidades para facilitarnos el trabajo
Automated Cme Password Spraying
⭐
9
A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout Threshold and a Reset Account Lockout Counter.
Creds Harvester
⭐
8
A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting
Kraken Project
⭐
8
A scalable pentesting platform
Gh0stbust3rz
⭐
8
Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game
Ironkit
⭐
8
Use IronPython directly in your code without IronPython DLLs and dependencies
Terminator
⭐
8
PowerShell script to terminate protected processes such as anti-malware and EDRs.
Blackcart
⭐
8
Custom Black arch based docker container for continuous automated red teaming
Nativepayload_tinjection
⭐
8
Remote Thread Injection by C# + Delegate Techniques
Last
⭐
7
Linux Automated Security scanning Tool
Red Team Ops Toolbox
⭐
7
A collection of open-source and commercial Red Team tools that aid in red team operations. This repository will help you with the majority part of red team engagement
Syn File
⭐
7
Exfiltrate data from a compromised target using covert channels
Slacker
⭐
7
Python script for pulling chat history for Slack channels using a stolen API token.
Damonmohammadbagher.github.io
⭐
7
Embed
⭐
7
Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, ProjectSauron, APT29, EquationGroup, including Stuxnet / Flame.
Reversepowernoid
⭐
7
Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)
Badstrings
⭐
7
List of Bad Strings for red teamers
Beryl
⭐
6
initial access payload injector through uac PE bypass windows defender
Awesome Phishing
⭐
6
Collection of resources related to phishing
Bustme
⭐
6
bustme is a directory brute forcing tool that assesses if pages exist according to the returned response body.
Redeval
⭐
6
Auditing with LLM evals for LLM applications.
Lolcrawler
⭐
6
Headless web crawler for bugbounty and penetration-testing/redteaming
Fudcrypt
⭐
6
GENERATE PYTHON BASED FUD STUB
Titanii
⭐
5
C2 Server for pentesting, exploitation, and payload creation
Tmpls
⭐
5
Yes.. definitely not a L2 networking protocol
Luckycheck
⭐
5
Modular Privesc ToolBox Add or Remove Tools as you want just with 4 lines and 6 lines for making it looks good ;)
Breaching Defenses.com
⭐
5
Red Team Home Lab for breaching-defenses.com with an ELK stack
Nemo
⭐
5
A copy of my little beautiful malware I used in IRSeC 2019
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Genavatar
⭐
5
This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
K Sploit
⭐
5
Optimized for use in Kali Linux, KSploit is a user friendly control panel in which to drive many metasploit tasks such as generating shells, payloads, and persistence scripts on the fly, starting listeners, and suggesting payloads and exploits.
201-237 of 237 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.