There are 78 repositories under redteaming topic.
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
The Rogue Access Point Framework
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
List of Awesome Red Teaming Resources
Red Teaming Tactics and Techniques
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Red Team Cheatsheet in constant expansion.
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
A PowerShell script anti-virus evasion tool
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Utilities for MITRE™ ATT&CK
Some notes and examples for cobalt strike's functionality
Leaked pentesting manuals given to Conti ransomware crooks
PowerShell rebuilt in C# for Red Teaming purposes
A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
OffSec OSINT Pentest/RedTeam Tools
Self-developed tools for Lateral Movement/Code Execution
crawls the website and finds broken social media links that can be hijacked
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
Collection of PowerShell functions a Red Teamer may use in an engagement
eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.