Statistics for topic redteam
RepositoryStats tracks 579,129 Github repositories, of these 488 are tagged with the redteam topic. The most common primary language for repositories using this topic is Python (108). Other languages include: Go (66), C# (49), C++ (31), PowerShell (30), C (26), Rust (26), Shell (26), HTML (12)
Stargazers over time for topic redteam
Most starred repositories for topic redteam (view more)
Trending repositories for topic redteam (view more)
Hunt down social media accounts by username across social networks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
RUDY is an acronym used to describe a Denial of Service (DoS) tool used by hackers to perform slow-rate a.k.a. “Low and slow” attacks.
Hunt down social media accounts by username across social networks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
RUDY is an acronym used to describe a Denial of Service (DoS) tool used by hackers to perform slow-rate a.k.a. “Low and slow” attacks.
Tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h
Hunt down social media accounts by username across social networks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.
📸 an Instagram tracker that logs any changes to an Instagram account (followers, following, posts, and bio)
LSASS memory dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It can be compiled as shellcode (PIC), supports XOR encryption, an...
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
A detailed plan to achieve proficiency in hacking and penetration testing, with pathways including obtaining a degree in cybersecurity or earning relevant certifications.
Hunt down social media accounts by username across social networks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.