Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for red team redteam tools
red-team
x
redteam-tools
x
2 search results found
Yakit
⭐
5,790
Cyber Security ALL-IN-ONE Platform
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Dismap
⭐
1,840
Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点
Goblin
⭐
1,182
一款适用于红蓝对抗中的仿真钓鱼系统
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Berylenigma
⭐
573
ffffffff0x team toolset for penetration testing, cryptography research, CTF and daily use. | ffffffff0x 团队工具集,用来进行渗透测试,密码学研究,CTF和日常使用。
About Attack
⭐
501
一个旨在通过应用场景 / 标签对 Github 红队向工具 / 资源进行分类收集,降低红队技术门槛的手册【持续更新】
Kubesploit
⭐
501
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Pipeviewer
⭐
423
A tool that shows detailed information about named pipes in Windows
Dome
⭐
412
Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports.
Offensive Osint Tools
⭐
373
OffSec OSINT Pentest/RedTeam Tools
Petitpotato
⭐
358
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
Krbuacbypass
⭐
322
UAC Bypass By Abusing Kerberos Tickets
Rpcmon
⭐
271
RPC Monitor tool based on Event Tracing for Windows
Pythonmemorymodule
⭐
265
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
Realm
⭐
221
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Sharpgmailc2
⭐
219
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
Etwhash
⭐
182
C# POC to extract NetNTLMv1/v2 hashes from ETW provider
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Wwwtree
⭐
146
A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.
Skanuvaty
⭐
140
Dangerously fast DNS/network/port scanner
Some_pentesters_securityresearchers_redteamers
⭐
97
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Turbo Attack
⭐
87
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
Impulsivedllhijack
⭐
81
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Cobaltstrike Headless
⭐
65
Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.
Dpapisnoop
⭐
62
A C# tool to output crackable DPAPI hashes from user MasterKeys
Duckduckc2
⭐
55
A proof-of-concept C2 channel through DuckDuckGo's image proxy service
Bumblecrypt
⭐
50
A Bumblebee-inspired Crypter
Process Hollowing Redteamops
⭐
46
Red Team Operation's Defense Evasion Technique.
Ezea
⭐
45
EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
Offensive Snippets
⭐
40
A repository with my code snippets for research/education purposes.
Lolbin Poc
⭐
32
Small PoC of using a Microsoft signed executable as a lolbin.
Sharpleftovers
⭐
30
A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup
Gcc Stealer
⭐
30
Google Chrome Cookies Stealer. Steals Chrome cookies
Catspin
⭐
29
Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway and deployed via AWS Cloudformation.
Pathprober
⭐
26
Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once
Malicious Rmqr Codes
⭐
23
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
Frostbyte
⭐
23
FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
Responder Parser
⭐
23
Most Responder's configuration power in your hand
Ddwpasterecon
⭐
22
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can collect and analyse data from these indexed pastesites to better protect against unknown threats.
Uuid Loader
⭐
21
UUID based Shellcode loader for your favorite C2
Bof Builder
⭐
18
C# .Net 5.0 project to build BOF (Beacon Object Files) in mass
Pendock
⭐
18
A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access either via X2Go or VNC
Tchopper
⭐
17
conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine
Aggressiveproxy
⭐
16
Project to enumerate proxy configurations and generate shellcode from CobaltStrike
Thecollective
⭐
16
The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/TheCollective #infosec #redteaming #pentest
Urlyzer
⭐
13
urlyzer is a URL parsing analysis tool.
Rti Toolkit
⭐
12
Remote Template Injection Toolkit
Mavoc
⭐
12
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
Docker
⭐
11
Cervantes plataform docker repository
Lnk2vbs
⭐
11
A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.
Cstorm Windows Startup Virus In C
⭐
9
An opensource Prank Startup Malware for windows developed using C Programming Language.
Terminator
⭐
8
PowerShell script to terminate protected processes such as anti-malware and EDRs.
Leaky
⭐
8
Leaky simplifies the management and visualization of database leak files containing credentials, enhancing efficiency in data analysis and redteam operations.
Cve 2021 1675 Lpe Exp
⭐
8
CVE-2021-1675 LPE Exploit
Pluto
⭐
8
一款集成了几十G工具的透测试系统-冥王星
Embed
⭐
7
Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, ProjectSauron, APT29, EquationGroup, including Stuxnet / Flame.
Upgopher
⭐
6
This is a simple Go web server that allows users to upload files and view a list of the uploaded files. The server can be run locally or deployed to a remote server.
Detectionnavigator
⭐
6
Lolcrawler
⭐
6
Headless web crawler for bugbounty and penetration-testing/redteaming
Nativepayload_dim
⭐
6
NativePayload_DIM Dynamic native dll Injection in Memory , Injecting Native DLL bytes to local Process
Nativepayload_dcp
⭐
5
Compiling Csharp in-memory and Execute to bypass AVs
Hookdetection_csharp
⭐
5
HookDetection
Breaching Defenses.com
⭐
5
Red Team Home Lab for breaching-defenses.com with an ELK stack
Genavatar
⭐
5
This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Related Searches
Penetration Testing Red Team (417)
Python Red Team (185)
Security Red Team (149)
Red Team Redteaming (132)
Cybersecurity Red Team (105)
Powershell Red Team (105)
Golang Red Team (100)
Security Tools Red Team (93)
Information Security Red Team (74)
1-2 of 2 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.