Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-47.17%)
red-tldr-dbRed TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation and try it out.
Stars: ✭ 33 (-79.25%)
tldr.eltldr client for Emacs
Stars: ✭ 118 (-25.79%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (-36.48%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-71.7%)
TLDR.jlA package for fast help and snippets
Stars: ✭ 16 (-89.94%)
CatharsisRaw syscall implementations with Powershell
Stars: ✭ 18 (-88.68%)
window-ratThe purpose of this tool is to test the window10 defender protection and also other antivirus protection.
Stars: ✭ 59 (-62.89%)
pitchThe initial conversation slides and menu of scenarios
Stars: ✭ 37 (-76.73%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-50.31%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-91.19%)
tldrSimplified and community-driven man pages (tldr-pages) in a single binary.
Stars: ✭ 33 (-79.25%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-78.62%)
Conf-ThiefA Red Team tool for exfiltrating sensitive data from Confluence pages.
Stars: ✭ 77 (-51.57%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-76.1%)
crimson-sprayA lockout aware password sprayer
Stars: ✭ 11 (-93.08%)
NativePayload CBTNativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
Stars: ✭ 109 (-31.45%)
TldrGolang command line client for tldr https://github.com/tldr-pages/tldr
Stars: ✭ 210 (+32.08%)
Tldr C ClientC command-line client for tldr pages
Stars: ✭ 180 (+13.21%)
Tachyons Tldrquick lookup for tachyon classes, scales and colour palette
Stars: ✭ 170 (+6.92%)
TldrlfsToo Long; Didn't Read Linux From Scratch
Stars: ✭ 139 (-12.58%)
Manpages TldrShort, practical manpages for everyday usage
Stars: ✭ 108 (-32.08%)
TldrText summarizer for golang using LexRank
Stars: ✭ 92 (-42.14%)
TealdeerA very fast implementation of tldr in Rust.
Stars: ✭ 1,189 (+647.8%)
Tldr AlfredAlfred workflow for TLDR
Stars: ✭ 70 (-55.97%)
Tltldr for R!
Stars: ✭ 52 (-67.3%)
Tldrfast and interactive tldr client written with go
Stars: ✭ 984 (+518.87%)
Tldr📚 Collaborative cheatsheets for console commands
Stars: ✭ 36,408 (+22798.11%)
Cheat.shthe only cheat sheet you need
Stars: ✭ 27,798 (+17383.02%)
Tldr Sh ClientSimplified and community-driven man pages
Stars: ✭ 583 (+266.67%)
Tldr Node ClientNode.js command-line client for tldr pages
Stars: ✭ 292 (+83.65%)
tldr-fluttersimplified man-pages, a tldr.sh client
Stars: ✭ 65 (-59.12%)
alfred-tldrtldr with alfred workflow written in Go
Stars: ✭ 77 (-51.57%)
tldr-phpPHP Client for tldr
Stars: ✭ 18 (-88.68%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+6398.74%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+6651.57%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-69.81%)
RedTeamOne line PS scripts that may come handy during your network assesment
Stars: ✭ 56 (-64.78%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-77.36%)
AggressorScriptsA collection of Cobalt Strike aggressor scripts
Stars: ✭ 18 (-88.68%)
certexfilExfiltration based on custom X509 certificates
Stars: ✭ 18 (-88.68%)
Scanners BoxA powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (+3415.72%)
Sn1perAttack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+2979.87%)
Traitor⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+2084.28%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+242.14%)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (+62.26%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+430.82%)
RedTeam toolkitRed Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (+89.31%)
GD-ThiefRed Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.
Stars: ✭ 28 (-82.39%)