Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for red team redteaming
red-team
x
redteaming
x
10 search results found
Bettercap
⭐
15,224
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Dirsearch
⭐
11,165
Web path scanner
Sliver
⭐
7,152
Adversary Emulation Framework
Awesome Red Teaming
⭐
6,470
List of Awesome Red Teaming Resources
Awesome Hacker Search Engines
⭐
6,307
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Redteaming Tactics And Techniques
⭐
3,744
Red Teaming Tactics and Techniques
Penetration Testing Tools
⭐
2,393
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Malicious Pdf
⭐
2,029
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Ezxss
⭐
1,715
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Diamorphine
⭐
1,639
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Inceptor
⭐
1,295
Template-Driven AV/EDR Evasion Framework
Lockdoor Framework
⭐
1,254
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Security List
⭐
1,181
If you have any good suggestions or comments during the search process, please feedback some index experience in issues. Thank you for your participation.查阅过程中,如果有什么好的意见或建议,请在Issues反馈,感谢您的参与
Emp3r0r
⭐
1,151
Linux/Windows post-exploitation framework made by linux user
Galaxy Bugbounty Checklist
⭐
1,133
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Awesome Redteam Cheatsheet
⭐
1,017
Red Team Cheatsheet in constant expansion.
Attack Tools
⭐
977
Utilities for MITRE™ ATT&CK
Leaky Paths
⭐
746
A collection of special paths linked to common internal paths, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Slackpirate
⭐
717
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
0xsp Mongoose
⭐
529
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Cobalt Strike Cheatsheet
⭐
528
Some notes and examples for cobalt strike's functionality
Offensive Resources
⭐
498
A Huge Learning Resources with Labs For Offensive Security Players
Amsi Killer
⭐
488
Lifetime AMSI bypass
Bigbountyrecon
⭐
471
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Cobalt_strike_extension_kit
⭐
453
Attempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Powershell Red Team
⭐
437
Collection of PowerShell functions a Red Teamer may use in an engagement
Alanframework
⭐
435
A C2 post-exploitation framework
Offensive Osint Tools
⭐
373
OffSec OSINT Pentest/RedTeam Tools
Power Pwn
⭐
370
An offensive and defensive security toolset for Microsoft 365 Power Platform
Offensive Reverse Shell Cheat Sheet
⭐
351
Collection of reverse shells for red team operations, penetration testing, and offensive security.
Socialhunter
⭐
307
crawls the website and finds broken social media links that can be hijacked
Pythonmemorymodule
⭐
265
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
Realm
⭐
221
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Nativepayloads
⭐
219
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Sharpgmailc2
⭐
219
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
Reverse Shell Cheatsheet
⭐
218
🙃 Reverse Shell Cheat Sheet 🙃
Emailall
⭐
216
EmailAll is a powerful Email Collect tool — 一款强大的邮箱收集工具
Cervantes
⭐
215
Cervantes is an opensource collaborative platform for pentesters or red teams who want to save time to manage their projects, clients, vulnerabilities and reports in one place.
Mrkaplan
⭐
200
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Leakscraper
⭐
193
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
I See You
⭐
188
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Amnesiac
⭐
157
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Remote Desktop Caching
⭐
155
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Passcat
⭐
153
Passwords Recovery Tool
Redteam Hardware Toolkit
⭐
140
🔺 Red Team Hardware Toolkit 🔺
The_hive
⭐
137
My public notes about offensive security
Inlinewhispers2
⭐
136
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Redteam Physical Tools
⭐
129
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
Cve 2022 23808
⭐
110
phpMyAdmin XSS
Synergy Httpx
⭐
106
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
Murmurhash
⭐
101
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Secfiles
⭐
94
My files for security assessments, bug bounty and other security related stuff
Mediator
⭐
91
An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.
Lazypariah
⭐
90
A tool for generating reverse shell payloads on the fly.
Turbo Attack
⭐
87
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
Sub Drill
⭐
82
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Controlcompass.github.io
⭐
76
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
Bof Dll Inject
⭐
75
Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.
Suass
⭐
75
one-stop resource for all things offensive security.
Reversepowershell
⭐
63
Functions that can be used to gain Reverse Shells with PowerShell
Powerexfil
⭐
56
A collection of data exfiltration scripts for Red Team assessments.
G3nius Tools Sploit
⭐
53
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
Cybersecurity Red Team
⭐
49
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
Sherlock
⭐
46
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Process Hollowing Redteamops
⭐
46
Red Team Operation's Defense Evasion Technique.
Ezea
⭐
45
EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
Redteam
⭐
41
One line PS scripts that may come handy during your network assesment
Offensive Snippets
⭐
40
A repository with my code snippets for research/education purposes.
Hackarsenaltoolkit
⭐
39
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Acheron
⭐
38
indirect syscalls for AV/EDR evasion in Go assembly
Monarch
⭐
36
Monarch - The Adversary Emulation Toolkit
Nativepayload_pe1
⭐
35
NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing RWX to X or RX or (both) [Bypassing AVs]
Ensemble
⭐
33
A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting to scan multiple bug bounty programs simultaneously, on a recurring basis.
Lolbin Poc
⭐
32
Small PoC of using a Microsoft signed executable as a lolbin.
Sharpleftovers
⭐
30
A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup
Gcc Stealer
⭐
30
Google Chrome Cookies Stealer. Steals Chrome cookies
Certexfil
⭐
25
Exfiltration based on custom X509 certificates
Responder Parser
⭐
23
Most Responder's configuration power in your hand
Malicious Rmqr Codes
⭐
23
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
Ddwpasterecon
⭐
22
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can collect and analyse data from these indexed pastesites to better protect against unknown threats.
Rfid Gooseneck
⭐
21
Full Build Guide for making your own RFID Gooseneck Long Range Reader!
Bof Builder
⭐
18
C# .Net 5.0 project to build BOF (Beacon Object Files) in mass
Thecollective
⭐
16
The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/TheCollective #infosec #redteaming #pentest
Osintbookmarks
⭐
16
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Offensiveactivedirectory
⭐
15
A set of instructions, command and techniques that help during an Active Directory Assessment.
Jalsi
⭐
15
JALSI - Just Another Lame Shellcode Injector
Redbloodc2
⭐
15
Wmiexec2
⭐
14
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
Palinka_c2
⭐
14
Just another useless C2 occupying space in some HDD somewhere.
Urlyzer
⭐
13
urlyzer is a URL parsing analysis tool.
Redelk Kibana App
⭐
12
Kibana app for RedELK
Spotexfil
⭐
12
A simple way to exfiltrate data using spotify API
Rti Toolkit
⭐
12
Remote Template Injection Toolkit
Mavoc
⭐
12
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
Addreferencedotredteam
⭐
12
A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collection of C# red team projects in 1 Lib.
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Red Team Tools
⭐
11
Repo containing cracked red teaming tools.
Docker
⭐
11
Cervantes plataform docker repository
Restless
⭐
10
A light in-memory implant in C# that bypasses Windows Firewall and Defender.
Related Searches
Penetration Testing Red Team (373)
Python Red Team (240)
1-10 of 10 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.