Statistics for topic redteam
RepositoryStats tracks 518,986 Github repositories, of these 434 are tagged with the redteam topic. The most common primary language for repositories using this topic is Python (98). Other languages include: Go (60), C# (47), PowerShell (27), C++ (26), Shell (24), C (23), Rust (19), HTML (12)
Stargazers over time for topic redteam
Most starred repositories for topic redteam (view more)
Trending repositories for topic redteam (view more)
🔎 Hunt down social media accounts by username across social networks
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution
Some Rust program I wrote while learning Malware Development
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.
🔎 Hunt down social media accounts by username across social networks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution
Some Rust program I wrote while learning Malware Development
BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
🔎 Hunt down social media accounts by username across social networks
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution
Some Rust program I wrote while learning Malware Development
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cl...
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
🔎 Hunt down social media accounts by username across social networks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
🦀 | RustRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Rust programming language.
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit