Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation red team
exploitation
x
red-team
x
3 search results found
Red Teaming Toolkit
⭐
8,230
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Awesome Hacker Search Engines
⭐
6,307
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Cve
⭐
5,806
Gather and update all available and newest CVEs with their PoC.
Yakit
⭐
5,790
Cyber Security ALL-IN-ONE Platform
Winpwn
⭐
3,151
Automation for internal Windows Penetrationtest / AD-Security
Kscan
⭐
3,061
Kscan是一款纯go开发的全方位扫描器,具备端口扫描、协议检测、指纹识别,暴力破解等功能。支持协议
Penetration Testing Tools
⭐
2,393
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Silenttrinity
⭐
2,087
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
100 Redteam Projects
⭐
1,661
Projects for security students
A Red Teamer Diaries
⭐
1,294
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Security List
⭐
1,181
If you have any good suggestions or comments during the search process, please feedback some index experience in issues. Thank you for your participation.查阅过程中,如果有什么好的意见或建议,请在Issues反馈,感谢您的参与
Wadcoms.github.io
⭐
1,158
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Emp3r0r
⭐
1,151
Linux/Windows post-exploitation framework made by linux user
Goby
⭐
1,081
Attack surface mapping
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Deimosc2
⭐
926
DeimosC2 is a Golang command and control framework for post-exploitation.
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Sam The Admin
⭐
818
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
Awesome List Of Secrets In Environment Variables
⭐
722
🦄🔒 Awesome list of secrets in environment variables 🖥️
Fireelf
⭐
637
fireELF - Fileless Linux Malware Framework
Cve 2021 44228 Poc Log4j Bypass Words
⭐
611
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Mxtract
⭐
573
mXtract - Memory Extractor & Analyzer
Kubehound
⭐
552
Kubernetes Attack Graph
Rubyfu
⭐
311
Rubyfu, where Ruby goes evil!
Godgenesis
⭐
260
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
Nacs
⭐
230
事件驱动的渗透测试扫描器 Event-driven pentest scanner
Cvemon
⭐
228
Monitoring exploits & references for CVEs
Covermyass
⭐
227
Post-exploitation tool to cover your tracks on a compromised machine
Jiraffe
⭐
178
One stop place for exploiting Jira instances in your proximity
Cve 2023 46747 Rce
⭐
159
exploit for f5-big-ip RCE cve-2023-46747
Web_hacking
⭐
135
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
Pwn Pulse
⭐
131
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Find Gh Poc
⭐
117
Find CVE PoCs on GitHub
Cve 2022 23808
⭐
110
phpMyAdmin XSS
Shonydanza
⭐
110
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Cve 2022 0337 Poc Google Chrome Microsoft Edge Opera
⭐
79
🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337
Log4j
⭐
74
Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
G3nius Tools Sploit
⭐
53
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
Exchange Penetration Testing
⭐
41
The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)
Redteam
⭐
41
One line PS scripts that may come handy during your network assesment
Volana
⭐
39
🌒 Shell command obfuscation to avoid detection systems
Cve 2023 47246 Exp
⭐
39
exploit for cve-2023-47246 SysAid RCE (shell upload)
Constole
⭐
35
Scan for and exploit Consul agents
Cve 2018 4407
⭐
29
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Readhook
⭐
24
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Fudrat
⭐
22
Generate Undetectable Metasploit Payload in a simple way
Purple
⭐
16
scripts to setup environments for red/blue teams.
Pwnfaces
⭐
15
Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)
6 Eyed Spider
⭐
14
Post-exploitation tool collects data going out and coming into the browser and makes use of it.
Inyourmems
⭐
13
Windows Antivirus Evasion and Memory Injection
Apache Tomcat Pentesting
⭐
11
Apache Tomcat exploit and Pentesting guide for penetration tester
Fuzzout
⭐
9
Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
Get Shodan
⭐
8
The program allows to download large data from shodan quickly, simply and avoid errors.
Rabbitmq Pentesting
⭐
6
RabbitMQ exploit and Pentesting guide for penetration tester
Egebalci
⭐
6
Pentesting Methodology
⭐
6
When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to help while on a Pentest/CTF.
Oao
⭐
6
⚙️ Operating Account Operators (OAO) is a Golang tool to interact with the LDAP protocol to manage account groups, roles, ACLs/ACEs, etc...
Ill
⭐
5
🐧 I Love Linux (ILL) is a C tool developed to fast search for kernel vulnerabilities and suggest to the user
Hermit
⭐
5
A post-exploitation, command and control framework written in Rust.
Nayra
⭐
5
LFI Exploitation Tool
Windows And Active Directory
⭐
5
Auto Postxploit
⭐
5
Windows Auto Post Exploitation - For ReD Team
Red Team
⭐
5
The following repo holds all scripts, apps, and documentation for InfoSec Red Team related activities.
Arbimz
⭐
5
🔥 Arbimz is a python tool developed to exploit CVE-2019-9670
Black_veil
⭐
5
A simple pseudo-crypter for python code.
Attackmate
⭐
5
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
Related Searches
Python Exploitation (1,622)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Penetration Testing Red Team (446)
Exploitation Penetration Testing (357)
1-3 of 3 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.