Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
-
Updated
Feb 2, 2023 - PowerShell
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Remote Administration Tool for Windows
Adversary Emulation Framework
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
The all-in-one Red Team extension for Web Pentester
Automated Adversary Emulation Platform
Gather and update all available and newest CVEs with their PoC.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Wiki to collect Red Team infrastructure hardening resources
Covenant is a collaborative .NET C2 framework for red teamers.
Tools and Techniques for Red Team / Penetration Testing
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Kscan是一款纯go开发的全方位扫描器,具备端口扫描、协议检测、指纹识别,暴力破解等功能。支持协议1200+,协议指纹10000+,应用指纹20000+,暴力破解协议10余种。
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
RedEye is a visual analytic tool supporting Red & Blue Team operations
Leak git repositories from misconfigured websites
Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Add a description, image, and links to the red-team topic page so that developers can more easily learn about it.
To associate your repository with the red-team topic, visit your repo's landing page and select "manage topics."