COLLECTED BY
This is a Collection of URLs (and Outlinked URLs) extracted from a random feed of 1% of all Tweets.
The Wayback Machine - https://web.archive.org/web/20211223195150/https://github.com/topics/red-teaming
Here are
51 public repositories
matching this topic...
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com
Updated
Jul 24, 2021
PowerShell
The all-in-one Red Team extension for Web Pentester 🛠
Updated
Dec 22, 2021
JavaScript
Adversary Emulation Framework
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
Updated
Dec 23, 2021
Python
A collection of more than 160+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Updated
Dec 13, 2021
PowerShell
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Template-Driven AV/EDR Evasion Framework
Updated
Dec 5, 2021
Assembly
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
Updated
Sep 26, 2021
Python
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻 🐚
Updated
Dec 22, 2021
Rust
A Huge Learning Resources with Labs For Offensive Security Players
A C2 post-exploitation framework
Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.
A collection of useful links for Pentesters
Open-Source Collection of Social Engineering Pretexts
👋 Stealthy data exfiltration via IPv6 covert channel
Updated
Jul 26, 2019
Python
Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
SMBExec implementation in Nim - SMBv2 using NTLM Authentication with Pass-The-Hash technique
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Updated
May 16, 2021
Shell
A small .NET compression utility
This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.
A multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
Updated
Nov 26, 2021
Python
Python Script to help/automate the WiFi hacking exercises.
Updated
Mar 11, 2021
Python
Extracting Syscall Stub, Modernized
RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.
Updated
Dec 7, 2021
JavaScript
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Updated
Nov 24, 2021
Shell
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Updated
Dec 8, 2020
Shell
JALSI - Just Another Lame Shellcode Injector
Cheatsheets, References, and notes on various red teaming/pentesting topics.
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Improve this page
Add a description, image, and links to the
red-teaming
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
red-teaming
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
After a plugin runs, the first half or so of the following prompt is cutting cut off. This appears to be an issue on the handler side because the target is sending the full prompt over the network. I think it might have something to do with the mutex that blocks output while a plugin is running.