The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
Go
Updated May 2, 2019
🔎 Find usernames across social networks
Python
Updated Apr 28, 2019
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
PowerShell
Updated Apr 16, 2019
E-mails, subdomains and names Harvester - OSINT
Python
Updated May 3, 2019
List of Awesome Red Teaming Resources
Updated Jan 2, 2019
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
XSLT
Updated Dec 10, 2018
Curated list of Unix binaries that can be exploited to bypass system security restrictions
HTML
Updated Apr 16, 2019
The goal of this repository is to document the most common techniques to bypass AppLocker.
PowerShell
Updated Mar 19, 2019
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
XSLT
Updated Apr 3, 2019
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, sh…
good first issue
New feature
#41 opened 8 months ago by sevagas
Python
Updated Nov 10, 2018
Utilities for MITRE™ ATT&CK
PLpgSQL
Updated Apr 11, 2019
mXtract - Offensive Memory Extractor & Analyzer
C++
Updated Apr 15, 2019
Venom - A Multi-hop Proxy for Penetration Testers Written in Go
Go
Updated Mar 8, 2019
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted n…
Go
Updated Apr 18, 2019
Perun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Python
Updated Apr 25, 2019
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Python
Updated Jan 29, 2019
Hershell is a simple TCP reverse shell written in Go.
Go
Updated Sep 21, 2018
Scan your code for security misconfiguration, search for passwords and secrets. 🔍
JavaScript
Updated Mar 13, 2019
This repository contains full code examples from the book Gray Hat C#
C#
Updated Jul 21, 2017
A poorman's proxycannon and botnet, using docker, ovpn files, and a dante socks5 proxy
Python
Updated Oct 10, 2018
🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, …
Python
Updated Sep 21, 2018
Fileless Linux Malware Framework
Python
Updated Apr 17, 2019
Test Blue Team detections without running any attack.
C#
Updated Apr 2, 2019
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tool…
Python
Updated Jan 21, 2019
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
C++
Updated Nov 20, 2017
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files …
Python
Updated Aug 4, 2018
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it ag…
PowerShell
Updated Apr 28, 2019
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team,…
PowerShell
Updated Feb 17, 2019
红队基础设施自动化部署工具
Shell
Updated Apr 17, 2019
A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
PowerShell
Updated Apr 5, 2019