Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for hacking tool red team
hacking-tool
x
red-team
x
11 search results found
Dirsearch
⭐
11,165
Web path scanner
Awesome Hacker Search Engines
⭐
6,307
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Yakit
⭐
5,790
Cyber Security ALL-IN-ONE Platform
Hacktools
⭐
5,367
The all-in-one browser extension for offensive security professionals 🛠
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Awesome Mobile Security
⭐
2,511
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
100 Redteam Projects
⭐
1,661
Projects for security students
Diamorphine
⭐
1,639
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Cloakify
⭐
1,483
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Pi Pwnbox Rogueap
⭐
1,263
Homemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Lockdoor Framework
⭐
1,254
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Emp3r0r
⭐
1,151
Linux/Windows post-exploitation framework made by linux user
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Dumpsterfire
⭐
709
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Paradoxiarat
⭐
663
ParadoxiaRat : Native Windows Remote access Tool.
Packetwhisper
⭐
605
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Alanframework
⭐
435
A C2 post-exploitation framework
Dome
⭐
412
Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports.
Ntlmrecon
⭐
397
Enumerate information from NTLM authentication enabled web endpoints 🔎
Power Pwn
⭐
370
An offensive and defensive security toolset for Microsoft 365 Power Platform
Sharpgmailc2
⭐
219
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
Emailall
⭐
216
EmailAll is a powerful Email Collect tool — 一款强大的邮箱收集工具
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Eternalhushframework
⭐
167
EternalHush - new free advanced open-source c2 framework
Remote Desktop Caching
⭐
155
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Wwwtree
⭐
146
A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.
Redteam Hardware Toolkit
⭐
140
🔺 Red Team Hardware Toolkit 🔺
Skanuvaty
⭐
140
Dangerously fast DNS/network/port scanner
Pentesting Dockerfiles
⭐
126
Pentesting/Bugbounty Dockerfiles.
Synergy Httpx
⭐
106
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
Preferred Network List Sniffer
⭐
98
A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.
Turbo Attack
⭐
87
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
Recon
⭐
73
Enumerate a target Based off of Nmap Results
Sf2
⭐
60
Antivirus Signature Search Toolkit
Uberducky
⭐
59
Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)
Puwr
⭐
54
Pivot your way deeper into computer networks with SSH compromised machines.
Cloudcopy
⭐
46
This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapshot permission.
Hackarsenaltoolkit
⭐
39
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Redteamwiki
⭐
36
Pentest Resources Cheat Sheets
⭐
33
This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-ups, tools, techniques, programming/scripting notes, and more. I documented them in this repo to provide like-minded offensive security enthusiasts and professionals easy access to these valuable resources.
Catspin
⭐
29
Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway and deployed via AWS Cloudformation.
Cve 2018 4407
⭐
29
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Ddwpasterecon
⭐
22
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can collect and analyse data from these indexed pastesites to better protect against unknown threats.
Web Scanner
⭐
17
Escaner WEB que tiene como objetivo sacar toda la información posible como IP, CMS, Usuarios, posibles correos, rendimiento de la URL, Puertos Abiertos, Subdirectorios ... Etc.
Webexploit
⭐
17
Web Exploit Was here ! advanced web hacking and hacker toolkit
Nucleimonst3r
⭐
15
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
Wmiexec2
⭐
14
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
Mavoc
⭐
12
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
Dnsupdate
⭐
11
A python based script to update DNS entries in ADIDNS
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Oss
⭐
10
Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.
Macgonuts
⭐
9
💻 🔌 📡 🔨 🔧 🔎 💣 ♠️ 👾 :trollface: :godmode: An ARP/NDP swiss army knife to make MAC going nuts on networks around!
Cstorm Windows Startup Virus In C
⭐
9
An opensource Prank Startup Malware for windows developed using C Programming Language.
Last
⭐
7
Linux Automated Security scanning Tool
Tempor
⭐
6
Ephemeral Infrastructure for Dummies
Pwnbox
⭐
6
Script to build your own pwnbox with hacking tools and small scripts used in CTFs and Bug Bounty.
Darkqr
⭐
6
DarkQR tiene como objetivo crear QRs para los usuarios, de esta forma, las empresas pueden aprovechar el máximo potencial de la misma a través de una sencilla e intuitiva ejecución con diversos parámetros.
Kashz Jewels
⭐
6
Gitbook: kashz-Jewels
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Auto Postxploit
⭐
5
Windows Auto Post Exploitation - For ReD Team
Xtremenmapparser
⭐
5
XtremeNmapParser (XNP) is a tool that takes XML files generated by Nmap and converts them into accessible and easily manipulable formats such as CSV, XLSX, and JSON. It allows processing multiple Nmap XML files, merging them into a single dataset, and exporting them in various formats.
Related Searches
Python Hacking Tool (590)
1-11 of 11 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.