There are 2 repositories under readteam topic.
红蓝对抗以及护网相关工具和资料,内存shellcode(cs+msf)和内存马查杀工具
Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀
TeamServer and Client of Exploration Command and Control Framework
A proof of concept for a clickjacking attack on macOS.
Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s
A domain recon tool capable of finding subdomains and subnets and then harvesting HTTP screen shots and whois data about them.
.NET & Native crypter with modern GUI
Data Converter Toolkit – Convert Between Multiple Encodings & Encryptions Effortlessly
HashStorm is a high-speed, multiprocessing hash cracking tool written in Python. Unleash maximum CPU power and crack hashes with lightning-fast efficiency!
A POWERFULL DDOS tool . uses IP spoofing for anonymity and maximizes attack speed with multi-threading and asynchronous programming.
A demonstration of keyloggers written in python . How it works and How to defend and remove such keyloggers from ur system
ShadowCrypt: Secure File Encryption & Decryption ! Effortlessly encrypt and decrypt your files with military-grade AES protection, ensuring your data stays safe and private.
An advanced Python script that automates sending WhatsApp messages using pywhatkit. It allows users to send text, images, or videos to multiple contacts, with scheduled or instant delivery.
A Red Team vs. Blue Team scenario in which you will play the role of both Pentester and SOC analyst.
Tactician of Role-Interchanging Cloud Keys (Effortless AWS persistence via AssumeRole).
ShadowCrypt: Secure File Encryption & Decryption ! Effortlessly encrypt and decrypt your files with military-grade AES protection, ensuring your data stays safe and private.
Adversaries commonly abuse the Local Security Authority Subsystem Service (LSASS) to dump credentials for privilege escalation, data theft, and lateral movement. The process is a fruitful target for adversaries because of the sheer amount of sensitive information it stores in memory.
Briefly Describe The Theory of FUD Payloads , How Hackers inject Payloads in PDF , How They Deliver & Target Victims , Bypassing Security Measures and How To Stay Safe !
A Wide Collection of DDOS Tools , Softwares & Scripts !
Password-Tester: An Advanced Password Strength Analyzer with GUI & Terminal Output
Phone Number Lookup – Get Location, Carrier & Timezone Info