There are 75 repositories under redteaming topic.
The Rogue Access Point Framework
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
List of Awesome Red Teaming Resources
Red Teaming Tactics and Techniques
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Red Team Cheatsheet in constant expansion.
A PowerShell script anti-virus evasion tool
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Utilities for MITRE™ ATT&CK
Some notes and examples for cobalt strike's functionality
Leaked pentesting manuals given to Conti ransomware crooks
A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
PowerShell rebuilt in C# for Red Teaming purposes
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Self-developed tools for Lateral Movement/Code Execution
crawls the website and finds broken social media links that can be hijacked
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
OffSec OSINT Pentest/RedTeam Tools
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
Collection of PowerShell functions a Red Teamer may use in an engagement
eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.