Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for red team offensive security
offensive-security
x
red-team
x
18 search results found
Redteaming Tactics And Techniques
⭐
3,744
Red Teaming Tactics and Techniques
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Black Hat Rust
⭐
2,662
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
Ligolo Ng
⭐
1,950
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Blackmamba
⭐
688
C2/post-exploitation framework
Powershell Obfuscation Bible
⭐
574
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository are the result of personal research, including reading materials online and conducting trial-and-error attempts in labs and pentests.
Offensive Resources
⭐
498
A Huge Learning Resources with Labs For Offensive Security Players
Bigbountyrecon
⭐
471
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Threathunting Keywords
⭐
252
Awesome list of keywords for Threat Hunting sessions
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Nativepayloads
⭐
219
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Invoke Apex
⭐
175
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Novaldr
⭐
172
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Atomic Red Team Intelligence C2
⭐
163
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Pyphisher
⭐
154
Python tool for phishing
Wwwtree
⭐
146
A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.
Redteamguides.github.io
⭐
130
Red Team Guides
Awesome Lists
⭐
124
Security lists for SOC detections
Red Team Playbooks
⭐
123
This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
Ashirt Server
⭐
112
Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit
Synergy Httpx
⭐
106
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
Sharpshellpipe
⭐
102
This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.
Some_pentesters_securityresearchers_redteamers
⭐
97
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Terminatorz
⭐
95
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
Secfiles
⭐
94
My files for security assessments, bug bounty and other security related stuff
Xmt
⭐
78
eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features
Suass
⭐
75
one-stop resource for all things offensive security.
Httpworker
⭐
74
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Ashirt
⭐
44
It records your screenshots and code, then lets you upload to ASHIRT
Sqlmutant
⭐
44
SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web applications, uses various techniques to detect vulnerabilities, including pattern matching, error analysis, and timing attacks. The integration of Waybackurls and Arjun allows the tool to find additional
Gopher
⭐
40
C# tool to discover low hanging fruits
Acheron
⭐
38
indirect syscalls for AV/EDR evasion in Go assembly
C2pe
⭐
34
C2 and Post Exploitation Code
Posts
⭐
34
Posts about different topics
Bifrost
⭐
34
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
Malicious Rmqr Codes
⭐
23
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
Rustredops
⭐
22
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and malware for Red Team, with a specific focus on the Rust programming language. (In Construction)
Aterm
⭐
22
It records your terminal, then lets you upload to ASHIRT
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Rusty Playground
⭐
20
Some Rust program I wrote while learning Malware Development
Thunderstorm
⭐
20
Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)
Pvj Ctf Redtools
⭐
20
Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.
Powershell Administration Tools
⭐
20
Powershell scripts for automating common system administration, blue team, and digital forensics tasks
Ttps
⭐
17
Tactics, Techniques, and Procedures
Meteor
⭐
17
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Autowin
⭐
16
Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
Thecollective
⭐
16
The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/TheCollective #infosec #redteaming #pentest
Offensiveactivedirectory
⭐
15
A set of instructions, command and techniques that help during an Active Directory Assessment.
Csc Redops
⭐
15
HTU Cyber Security Club, Offensive Operations Section (Red Team) learning pathway
Tramphook
⭐
13
x86 Trampoline Hook
Urlyzer
⭐
13
urlyzer is a URL parsing analysis tool.
Rti Toolkit
⭐
12
Remote Template Injection Toolkit
Pointer
⭐
11
Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Pydorker
⭐
10
Python tool for Dorking
Hack_hard
⭐
10
A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
Goblyn
⭐
9
Goblyn is a Python tool focused to enumeration and capture of website files metadata.
Pwnbox
⭐
6
Script to build your own pwnbox with hacking tools and small scripts used in CTFs and Bug Bounty.
Crto
⭐
6
Our repo for crushing through RTO course & labs.
Sycp
⭐
5
Anotações realizadas durante a certificação SYCP
Pacs Recon Flashcards
⭐
5
Physical Access Control Systems (PACS) Reconnaissance Flashcards
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Overwhelm
⭐
5
Overwhelm's Vanquish is a Kali Linux based Enumeration Orchestrator built in Python running inside a docker container. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell
Related Searches
Penetration Testing Red Team (373)
Python Red Team (240)
1-18 of 18 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.