RedTeam-Security - In this repo you will get the information of Red Team Security related links

Overview

OSINT

Passive Discovery

Target User Population Collection

Public Site Lookup (Github, Gitlab, etc.)

Cloud Recon

Microsoft / Windows

Active Discovery

ADFS

Web App

Phishing

Phishing Techniques - https://blog.sublimesecurity.com/

Microsfot 365 Device Code Phishing

Password Spray

Tools

IP Rotators

Default Password Check

Infrastructure

Cobal Strike

Malleable C2

Redirectors

Proxy Infrastructure Setup

Living Off Trusted Sites

Post-Exploitation

Windows Active Directory Recon/Survey

Windows Active Directory Attacks

Internal Phishing

Credential Theft

Windows

Internet Browsers

LSASS

Lateral Movement

Offensive C#

LiveOffTheLand

AV/AMSI Evasion

EDR Evasion

PowerShell

Log/Trace Deletion

Exploit Dev

Windows

Nix

RedTeam Researchers/Githubs/Gitbooks

Lab Resources

Resources

Security Testing Practice Lab

BlueTeam

Lab Resources

Threat Detection

Windows Security (What will BlueTeam look for?)

LDAP (Lightweight Directory Access Protocol)

Owner
Abhinav Pathak
๐Ÿ‘‹๐Ÿฝ Hello, I am Computer Science Engineer๐Ÿ’ปA Cyber Security Researcher who love automating โš™๏ธ boring stuff and contributing to the infosec community ๐ŸŒ
Abhinav Pathak
SEBUAH TOOLS TERMUX CRACK AKUN FF HOMKI AKUN EPEP DAH SATU FOLLOW AE YA BROO AWOKWOK

print " INSTALL TOOLS " $ pkg update && upgrade $ pkg install python2 $ pkg install git $ pip2 install lolcat $ pip2 install bs4 $ pip2 install reques

Jeeck 2 Nov 29, 2021
Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.

Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.

Md. Nur habib 31 Oct 21, 2022
A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.

A simple python script to dump remote files through a local file read or local file inclusion web vulnerability. Features Dump a single file w

Podalirius 48 Dec 03, 2022
(D)arth (S)ide of the (L)og4j (F)orce, the ultimate log4j vulnerabilities assessor

DSLF DSLF stands for (D)arth (S)ide of the (L)og4j (F)orce. It is the ultimate log4j vulnerabilities assessor. It comes with four individual Python3 m

frontal 1 Jan 11, 2022
Generate obfuscated meterpreter shells

Generator Evade AV with obfuscated payloads Installation must install dotnet prior to running the script with net45 Running ./generator.py -ip Your-I

Fawaz Al-Mutairi 219 Nov 28, 2022
Keystroke logging, often referred to as keylogging or keyboard capturing

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware

Harsha G 2 Jan 11, 2022
An Advanced Local Network IP Scanner, made in python of course!

โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ€ƒโ€ƒ โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•—โ€ƒโ€ƒโ–ˆโ–ˆโ•”โ•โ•โ•โ•โ•โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆโ•—โ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ–ˆโ–ˆโ•— โ–ˆโ–ˆโ•‘โ–ˆโ–ˆโ•”โ•โ•โ•โ•โ•โ–ˆโ–ˆโ•”โ•โ•โ–ˆโ–ˆ

Polsulpicien 2 Dec 18, 2021
A semi-automatic osint/recon framework.

Smog Framework A semi-automatic osint/recon framework. Requirements git Python = 3.8 How to use it

toast 22 Oct 17, 2022
An forensics tool to help aid in the investigation of spoofed emails based off the email headers.

A forensic tool to make analysis of email headers easy to aid in the quick discovery of the attacker. Table of Contents About mailMeta Installation Us

Syed Modassir Ali 59 Nov 26, 2022
Wireguard VPN Server Installer for: on Ubuntu, Debian, Arch, Fedora and CentOS

XGuard (Wireguard Server Installer) This Python script should make the installation of a Wireguard VPN server as easy as possible. Wireguard is a mode

Johann 3 Nov 04, 2022
Security audit Python project dependencies against security advisory databases.

Security audit Python project dependencies against security advisory databases.

52 Dec 17, 2022
Automatically download all 10,000 CryptoPunk NFTs.

CryptoPunk Stealer The sole purpose of this script is to download the entire CryptoPunk NFT collection. How does it work? Basically, the website where

Dan 7 Oct 22, 2022
Tinyman exploit finder - Tinyman exploit finder for python

tinyman_exploit_finder There was a big tinyman exploit. You can read about it he

fish.exe 9 Dec 27, 2022
vulnerable APIs

vulnerable-apis vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-api Setup Docker If, Out of the box docker pull kmmanoj/vulnerabl

9 Jun 01, 2022
่ฟ™ๆฌกๆ˜ฏๅฏๅฏ่็—…ๆฏ’๏ผ

ๅฏๅฏ่็—…ๆฏ’๏ผ ไบ‹ๆƒ…ๆ˜ฏ่ฟ™ๆ ท็š„๏ผŒๆˆ‘ๅˆๅผ€ๅง‹ไธๅนฒๆญฃไบ‹ไบ†ใ€‚ ไผ—ๆ‰€ๅ‘จ็Ÿฅ๏ผŒๅœจPython้‡Œ๏ผŒ0x0็ญ‰ไบŽ0๏ผŒไฝ†ๆ˜ฏไธ็ญ‰ไบŽๅฏๅฏ่ใ€‚ ่ฟ™ๅพˆไธๅฅฝ๏ผŒๆˆ‘ไปฌๅพ—ๆŠŠๅฎƒๆ”นๆˆๅฏๅฏ่๏ผ ๆ•ˆๆžœ ไธ€่ˆฌ็š„Pythonโ€”โ€” Python 3.8.0 (tags/v3.8.0:fa919fd, Oct 14 2019, 19:37:50) [MSC

้ป„ๅท 29 Jul 14, 2022
Files related to PoC||GTFO 21:21 - NSAโ€™s Backdoor of the PX1000-Cr

Files related to PoC||GTFO 21:21 - NSAโ€™s Backdoor of the PX1000-Cr 64bit2key.py

Stefan Marsiske 15 Nov 26, 2022
Gefilte Fish GMail filter creator

Gefilte Fish: GMail filter maker Gefilte Fish automates the creation of GMail filters. Use it like this: from gefilte import GefilteFish,

Ned Batchelder 31 Sep 28, 2022
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found

dora Features Blazing fast as we are using ripgrep in backend Exploit/PoC steps for many of the API key, allowing to write a good report for bug bount

Siddharth Dushantha 243 Dec 27, 2022
PrivateRoom - Make your work private by building a system using arduino which instantly kills a program when someone enters your room/cabin

privateRoom Make your work private by building a system using arduino which instantly kills a program when someone enters your room/cabin STEPS: Uploa

Divyanshu Kumar 3 Nov 08, 2022
Operational information regarding the vulnerability in the Log4j logging library.

Log4j Vulnerability (CVE-2021-44228) This repo contains operational information regarding the vulnerability in the Log4j logging library (CVE-2021-442

Nationaal Cyber Security Centrum (NCSC-NL) 1.9k Dec 26, 2022