#
redteaming
Here are 82 public repositories matching this topic...
The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
security
monitoring
hid
proxy
mitm
hacking
wifi
ble
spoofing
wpa2
mousejack
wifi-security
deauthentication-attack
password-sniffer
redteaming
redteam
rogue-ap
dot11
network-attacks
pmkid
-
Updated
Jul 3, 2020 - Go
List of Awesome Red Teaming Resources
-
Updated
Dec 11, 2019
Red Teaming Tactics and Techniques
-
Updated
Mar 5, 2020 - PowerShell
Utilities for MITRE™ ATT&CK
-
Updated
Mar 17, 2020 - HTML
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
remoteaccess
backdoor
powershell
hacking
trojan
penetration-testing
rat
pentesting
hacking-tool
fud
redteaming
trojan-rat
-
Updated
Oct 18, 2019 - Python
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
-
Updated
Nov 13, 2019 - C++
A PowerShell script anti-virus evasion tool
-
Updated
May 28, 2020 - PowerShell
hacking
cybersecurity
penetration-testing
francais
pentesting
france
cyber-security
pentest-environment
hacking-tool
pentest-scripts
pentesters
pentest-tool
redteaming
redteam
hacking-tools
pentesting-tools
blueteaming
blackarch-packages
pentesting-python
sofianehamlaoui
-
Updated
Apr 18, 2020 - Python
PowerShell rebuilt in C# for Red Teaming purposes
-
Updated
Apr 4, 2020 - C#
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
-
Updated
May 22, 2020 - Python
ad-m
commented
Apr 28, 2019
Using polling is not the optimal solution you task. Short-term processes are not taken into account at all. Processor cycles for idle operations are consumed. A much more effective solution would be to monitor the "exec" system call. See https://stackoverflow.com/questions/29840213/how-do-i-trace-a-system-call-in-linux and https://github.com/drai
github
ruby
python
java
bash
php
github-page
reverse-shell
perl
netcat
xterm
reverse-proxy
penetration-testing
netcat-reverse
oscp
redteaming
redteam
reverse-shells
reverse-shell-generator
reverse-shell-as-a-service
-
Updated
Jan 28, 2020
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
-
Updated
Jan 21, 2019 - Python
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
osint
geolocation
phishing
phishing-attacks
bash-scripting
phishing-engagements
location-tracker
reconnaissance
location-tracking
redteaming
redteam
phishing-kit
osinttool
socialengineering
geotargeting
osint-reconnaissance
-
Updated
Apr 5, 2019 - Shell
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
hacking
forensics
penetration-testing
infrastructure-monitoring
forensic-analysis
blueteam
hacking-attack-tools
internal-pentest
redteaming
blue-team
redteam
hacking-tools
purpleteam
forensics-investigations
-
Updated
Aug 4, 2018 - Python
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
-
Updated
Aug 10, 2019 - C
Just Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
-
Updated
Nov 14, 2019 - Shell
hack
hardware
hackers
hacking
bugbounty
hacker
hacking-tool
hacker-tools
hardware-hacking
pentesters
redteaming
redteam
hacking-tools
hardware-hackers
pentester
synack
hacker-tool
redteam-hardware
redteam-hardware-tool
redteam-hardware-toolkit
-
Updated
Feb 27, 2020
Passwords Recovery Tool
credentials
secrets
pentesting
passwords
pentest
password-retrieval
redteaming
redteam
password-recovery
credentials-gathering
-
Updated
Nov 18, 2018 - C
Disposable and resilient red team infrastructure with Terraform
-
Updated
Feb 1, 2019 - HCL
A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems
-
Updated
Apr 11, 2019 - Go
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
-
Updated
Jun 22, 2020 - Python
A tool to help query AD via the LDAP protocol
-
Updated
Jun 18, 2020 - C#
Open Source - Common Findings DataBase (JSON & MD)
-
Updated
May 21, 2020 - JavaScript
A collection of data exfiltration scripts for Red Team assessments.
-
Updated
Feb 21, 2020 - PowerShell
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
intelligence
cryptography
opensource
social-media
osint
social-network
australia
forensics
cybersecurity
police
ethical-hacking
intelligence-search-service
redteaming
osint-framework
osint-resources
darkweb-data
investigator
osint-reconnaissance
penetration-testing-tools
-
Updated
Sep 2, 2019
One line PS scripts that may come handy during your network assesment
-
Updated
Mar 8, 2020 - PowerShell
The initial conversation slides and menu of scenarios
-
Updated
Jul 2, 2020
Improve this page
Add a description, image, and links to the redteaming topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the redteaming topic, visit your repo's landing page and select "manage topics."
we can add a gif in that page explains how to get and upload it .
just like this
