Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for redteaming
redteaming
x
237 search results found
Bettercap
⭐
15,874
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Wifiphisher
⭐
12,807
The Rogue Access Point Framework
Dirsearch
⭐
11,165
Web path scanner
Sliver
⭐
7,152
Adversary Emulation Framework
Commando Vm
⭐
6,685
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution.
[email protected]
Awesome Red Teaming
⭐
6,470
List of Awesome Red Teaming Resources
Awesome Hacker Search Engines
⭐
6,307
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Redteaming Tactics And Techniques
⭐
3,852
Red Teaming Tactics and Techniques
Hoaxshell
⭐
2,678
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Afrog
⭐
2,451
A Security Tool for Bug Bounty, Pentest and Red Teaming.
Penetration Testing Tools
⭐
2,393
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Redelk
⭐
2,315
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
Malicious Pdf
⭐
2,029
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Awesome Cybersecurity Handbooks
⭐
1,980
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
Ezxss
⭐
1,715
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
Diamorphine
⭐
1,639
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Inceptor
⭐
1,295
Template-Driven AV/EDR Evasion Framework
Lockdoor Framework
⭐
1,254
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Security List
⭐
1,181
If you have any good suggestions or comments during the search process, please feedback some index experience in issues. Thank you for your participation.查阅过程中,如果有什么好的意见或建议,请在Issues反馈,感谢您的参与
Emp3r0r
⭐
1,151
Linux/Windows post-exploitation framework made by linux user
Vulnerable Ad
⭐
1,134
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Galaxy Bugbounty Checklist
⭐
1,133
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Rdpthief
⭐
1,026
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
Awesome Redteam Cheatsheet
⭐
1,017
Red Team Cheatsheet in constant expansion.
Powershell Rat
⭐
1,008
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Attack Tools
⭐
977
Utilities for MITRE™ ATT&CK
Red Teaming Ttps
⭐
953
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Xencrypt
⭐
923
A PowerShell script anti-virus evasion tool
Nopowershell
⭐
789
PowerShell rebuilt in C# for Red Teaming purposes
Leaky Paths
⭐
746
A collection of special paths linked to common internal paths, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Slackpirate
⭐
717
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Xurlfind3r
⭐
534
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
0xsp Mongoose
⭐
531
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Cobalt Strike Cheatsheet
⭐
528
Some notes and examples for cobalt strike's functionality
Pyramid
⭐
515
a tool to help operate in EDRs' blind spots
C2concealer
⭐
501
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
Offensive Resources
⭐
498
A Huge Learning Resources with Labs For Offensive Security Players
Amsi Killer
⭐
488
Lifetime AMSI bypass
Cheesetools
⭐
479
Self-developed tools for Lateral Movement/Code Execution
Bigbountyrecon
⭐
471
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Offsec Reporting
⭐
459
Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool
Cobalt_strike_extension_kit
⭐
453
Attempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Powershell Red Team
⭐
437
Collection of PowerShell functions a Red Teamer may use in an engagement
Alanframework
⭐
435
A C2 post-exploitation framework
Ebook Bypassingavsbycsharp
⭐
419
eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)
Aws Cloudsaga
⭐
406
AWS CloudSaga - Simulate security events in AWS
Offensive Osint Tools
⭐
373
OffSec OSINT Pentest/RedTeam Tools
Power Pwn
⭐
370
An offensive and defensive security toolset for Microsoft 365 Power Platform
Chisel Strike
⭐
360
A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.
Offensive Reverse Shell Cheat Sheet
⭐
351
Collection of reverse shells for red team operations, penetration testing, and offensive security.
Gmailc2
⭐
350
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
Pyiris
⭐
328
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Socialhunter
⭐
307
crawls the website and finds broken social media links that can be hijacked
Adsearch
⭐
281
A tool to help query AD via the LDAP protocol
Evilginx3 Phishlets
⭐
268
Learn my systematic process of creating Evilginx Phishlets from scratch: https://www.simplerhacking.com
Pythonmemorymodule
⭐
265
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
Telegramrat
⭐
261
Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions
Redcsharp
⭐
255
Collection of C# projects. Useful for pentesting and redteaming.
Easyg
⭐
254
Here I gather all the resources about hacking that I find interesting
Oscp
⭐
235
Our OSCP repo: from popping shells to mental health.
Realm
⭐
221
Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.
Nativepayloads
⭐
219
All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming
Sharpgmailc2
⭐
219
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
Reverse Shell Cheatsheet
⭐
218
🙃 Reverse Shell Cheat Sheet 🙃
Emailall
⭐
216
EmailAll is a powerful Email Collect tool — 一款强大的邮箱收集工具
Cervantes
⭐
215
Cervantes is an opensource collaborative platform for pentesters or red teams who want to save time to manage their projects, clients, vulnerabilities and reports in one place.
Mrkaplan
⭐
200
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Hades
⭐
198
Go shellcode loader that combines multiple evasion techniques
Malleable C2 Profiles
⭐
193
Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
Leakscraper
⭐
193
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Conti Pentester Guide Leak
⭐
191
Leaked pentesting manuals given to Conti ransomware crooks
I See You
⭐
188
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Offsec Tools
⭐
181
Compiled tools for internal assessments
Dfw1n Osint
⭐
174
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Opsec Tradecraft
⭐
174
Collection of OPSEC Tradecraft and TTPs for Red Team Operations
Red Tldr
⭐
170
red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to execute, so it is more suitable for use by red team personnel with certain experience.
Excelntdonut
⭐
166
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
Amnesiac
⭐
157
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Remote Desktop Caching
⭐
155
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Passcat
⭐
153
Passwords Recovery Tool
Zombieant
⭐
149
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Jalesc
⭐
147
Just Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Flipperzero
⭐
143
This repo contains my own Ducky/BadUSB scripts, related PowerShell scripts and other Flipper Zero related stuff.
Ulexecve
⭐
141
ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teaming and anti-forensics purposes.
Redteam Hardware Toolkit
⭐
140
🔺 Red Team Hardware Toolkit 🔺
Sharpstrike
⭐
137
A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
The_hive
⭐
137
My public notes about offensive security
Inlinewhispers2
⭐
136
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Nuvola
⭐
134
Redteam Physical Tools
⭐
129
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
Ransim
⭐
126
Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in a controlled setting.
Atlasc2
⭐
125
C# C2 Framework centered around Stage 1 operations
Sshorty
⭐
122
A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems
Cve 2021 21315 Poc
⭐
121
CVE 2021-21315 PoC
Sh4d0wup
⭐
116
Signing-key abuse and update exploitation framework
Cve 2022 23808
⭐
110
phpMyAdmin XSS
Synergy Httpx
⭐
106
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
Murmurhash
⭐
101
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Arsenal
⭐
96
Offensive security tools weaponized
1-100 of 237 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.