There are 165 repositories under red-team topic.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Tools and Techniques for Red Team / Penetration Testing
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Wiki to collect Red Team infrastructure hardening resources
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
The Network Execution Tool
Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
:hammer: A modern multiple reverse shell sessions manager written in go
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
Tips and Tutorials for Bug Bounty and also Penetration Tests.
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).
The SpecterOps project management and reporting engine
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
C2/post-exploitation framework