GitHub监控消息提醒!!!
更新了:Red Team
描述:Página web con mis apuntes de Red Team
URL:https://github.com/jburnside307/Red-vs-Blue-Project
更新了:Red Team
描述:Página web con mis apuntes de Red Team
URL:https://github.com/jburnside307/Red-vs-Blue-Project
GitHub
GitHub - jburnside307/Red-vs-Blue-Project: In this project I played the role of a pentester and a SOC Analyst. As the Red Team…
In this project I played the role of a pentester and a SOC Analyst. As the Red Team I used tools such as Nmap, Nessus, and Metasploit to gain access to a vulnerable target. As the Blue Team I used ...
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team / Pentest Scripts I use
URL:https://github.com/the-blackgem/Scripts
更新了:Red Team
描述:Red Team / Pentest Scripts I use
URL:https://github.com/the-blackgem/Scripts
GitHub
GitHub - the-blackgem/Scripts: Red Team / Pentest Scripts I use
Red Team / Pentest Scripts I use. Contribute to the-blackgem/Scripts development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team / Pentest Scripts I use
URL:https://github.com/QMRonline/Red-Rabbit
更新了:Red Team
描述:Red Team / Pentest Scripts I use
URL:https://github.com/QMRonline/Red-Rabbit
GitHub
GitHub - QMRonline/Red-Rabbit: RedRabbit is an ethical hacking toolkit built for pen-testing and reconnaissance. It can be used…
RedRabbit is an ethical hacking toolkit built for pen-testing and reconnaissance. It can be used to identify attack vectors, brute-force protected files, extract saved network passwords, and obfusc...
GitHub监控消息提醒!!!
更新了:Red Team
描述:ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
URL:https://github.com/blackbotinc/Atomic-Red-Team-Intelligence-C2
更新了:Red Team
描述:ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
URL:https://github.com/blackbotinc/Atomic-Red-Team-Intelligence-C2
GitHub
GitHub - darmado/Atomic-Red-Team-C2: ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with…
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR. - darmado/Atomic-Red-Team-C2
GitHub监控消息提醒!!!
更新了:Red Team
描述:Python Pentest Tools For Red Team Ops
URL:https://github.com/Inanis333/Python-Pentest-Tools
更新了:Red Team
描述:Python Pentest Tools For Red Team Ops
URL:https://github.com/Inanis333/Python-Pentest-Tools
GitHub
GitHub - Inanis333/Python-Pentest-Tools: Python Pentest Tools For Red Team Ops
Python Pentest Tools For Red Team Ops . Contribute to Inanis333/Python-Pentest-Tools development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:🔥Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++, the architecture and usage like Cobalt Strike
URL:https://github.com/geemion/Khepri
更新了:Cobalt Strike
描述:🔥Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++, the architecture and usage like Cobalt Strike
URL:https://github.com/geemion/Khepri
GitHub
GitHub - roadwy/RIP
Contribute to roadwy/RIP development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2021
描述:my exp for chrome V8 CVE-2021-30551
URL:https://github.com/xmzyshypnc/CVE-2021-30551
更新了:CVE-2021
描述:my exp for chrome V8 CVE-2021-30551
URL:https://github.com/xmzyshypnc/CVE-2021-30551
GitHub
GitHub - xmzyshypnc/CVE-2021-30551: my exp for chrome V8 CVE-2021-30551
my exp for chrome V8 CVE-2021-30551. Contribute to xmzyshypnc/CVE-2021-30551 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:A .NET Runtime for Cobalt Strike's Beacon Object Files
URL:https://github.com/CCob/BOF.NET
更新了:Cobalt Strike
描述:A .NET Runtime for Cobalt Strike's Beacon Object Files
URL:https://github.com/CCob/BOF.NET
GitHub
GitHub - CCob/BOF.NET: A .NET Runtime for Cobalt Strike's Beacon Object Files
A .NET Runtime for Cobalt Strike's Beacon Object Files - CCob/BOF.NET
GitHub监控消息提醒!!!
更新了:红队
描述:Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点
URL:https://github.com/zhzyker/dismap
更新了:红队
描述:Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点
URL:https://github.com/zhzyker/dismap
GitHub
GitHub - zhzyker/dismap: Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点
Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点 - zhzyker/dismap
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Aggressor 插件包
URL:https://github.com/timwhitez/Cobalt-Strike-Aggressor-Scripts
更新了:Cobalt Strike
描述:Cobalt Strike Aggressor 插件包
URL:https://github.com/timwhitez/Cobalt-Strike-Aggressor-Scripts
GitHub
GitHub - timwhitez/Cobalt-Strike-Aggressor-Scripts: Cobalt Strike Aggressor 插件包
Cobalt Strike Aggressor 插件包. Contribute to timwhitez/Cobalt-Strike-Aggressor-Scripts development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:红队
描述:EHole(棱洞)2.0 重构版-红队重点攻击系统指纹探测工具
URL:https://github.com/EdgeSecurityTeam/EHole
更新了:红队
描述:EHole(棱洞)2.0 重构版-红队重点攻击系统指纹探测工具
URL:https://github.com/EdgeSecurityTeam/EHole
GitHub
GitHub - EdgeSecurityTeam/EHole: EHole(棱洞)3.0 重构版-红队重点攻击系统指纹探测工具
EHole(棱洞)3.0 重构版-红队重点攻击系统指纹探测工具. Contribute to EdgeSecurityTeam/EHole development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Red Team
描述:Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
URL:https://github.com/outflanknl/RedELK
更新了:Red Team
描述:Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
URL:https://github.com/outflanknl/RedELK
GitHub
GitHub - outflanknl/RedELK: Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well…
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations. - outflanknl/RedELK
GitHub监控消息提醒!!!
更新了:Red Team
描述:go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https://github.com/redcanaryco/atomic-red-team).
URL:https://github.com/activeshadow/go-atomicredteam
更新了:Red Team
描述:go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https://github.com/redcanaryco/atomic-red-team).
URL:https://github.com/activeshadow/go-atomicredteam
GitHub
GitHub - redcanaryco/atomic-red-team: Small and highly portable detection tests based on MITRE's ATT&CK.
Small and highly portable detection tests based on MITRE's ATT&CK. - redcanaryco/atomic-red-team
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike Beacon configuration extractor and parser.
URL:https://github.com/strozfriedberg/cobaltstrike-config-extractor
更新了:Cobalt Strike
描述:Cobalt Strike Beacon configuration extractor and parser.
URL:https://github.com/strozfriedberg/cobaltstrike-config-extractor
GitHub
GitHub - strozfriedberg/cobaltstrike-config-extractor: Cobalt Strike Beacon configuration extractor and parser.
Cobalt Strike Beacon configuration extractor and parser. - strozfriedberg/cobaltstrike-config-extractor
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Cobalt Strike random C2 Profile generator
URL:https://github.com/threatexpress/random_c2_profile
更新了:Cobalt Strike
描述:Cobalt Strike random C2 Profile generator
URL:https://github.com/threatexpress/random_c2_profile
GitHub
GitHub - threatexpress/random_c2_profile: Cobalt Strike random C2 Profile generator
Cobalt Strike random C2 Profile generator. Contribute to threatexpress/random_c2_profile development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Defences against Cobalt Strike
URL:https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence
更新了:Cobalt Strike
描述:Defences against Cobalt Strike
URL:https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence
GitHub
GitHub - MichaelKoczwara/Awesome-CobaltStrike-Defence: Defences against Cobalt Strike
Defences against Cobalt Strike. Contribute to MichaelKoczwara/Awesome-CobaltStrike-Defence development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:Cobalt Strike
描述:Convert Cobalt Strike profiles to IIS web.config files
URL:https://github.com/bashexplode/cs2webconfig
更新了:Cobalt Strike
描述:Convert Cobalt Strike profiles to IIS web.config files
URL:https://github.com/bashexplode/cs2webconfig
GitHub
GitHub - bashexplode/cs2webconfig: Convert Cobalt Strike profiles to IIS web.config files
Convert Cobalt Strike profiles to IIS web.config files - bashexplode/cs2webconfig