{"id":25911412,"url":"https://github.com/copyleftdev/use-algos-for-red-team","last_synced_at":"2025-07-19T02:02:27.019Z","repository":{"id":250989292,"uuid":"836064518","full_name":"copyleftdev/use-algos-for-red-team","owner":"copyleftdev","description":"repo with some cool samples projects for tooling  up","archived":false,"fork":false,"pushed_at":"2024-07-31T05:30:47.000Z","size":1529,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-03T09:17:24.244Z","etag":null,"topics":["bounty-hunting-tools","offensive-security","red-teaming","redteam","rust","shell-code","sql-injection-exploitation"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/copyleftdev.png","metadata":{"files":{"readme":"readme.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-07-31T05:05:19.000Z","updated_at":"2024-07-31T05:38:16.000Z","dependencies_parsed_at":"2024-07-31T06:55:10.316Z","dependency_job_id":"e4229dda-e731-4be3-9671-e7a7c19b13fe","html_url":"https://github.com/copyleftdev/use-algos-for-red-team","commit_stats":null,"previous_names":["copyleftdev/use-algos-for-read-team"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/copyleftdev/use-algos-for-red-team","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2Fuse-algos-for-red-team","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2Fuse-algos-for-red-team/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2Fuse-algos-for-red-team/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2Fuse-algos-for-red-team/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/copyleftdev","download_url":"https://codeload.github.com/copyleftdev/use-algos-for-red-team/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2Fuse-algos-for-red-team/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":265871854,"owners_count":23842088,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bounty-hunting-tools","offensive-security","red-teaming","redteam","rust","shell-code","sql-injection-exploitation"],"created_at":"2025-03-03T09:17:26.318Z","updated_at":"2025-07-19T02:02:26.991Z","avatar_url":"https://github.com/copyleftdev.png","language":null,"readme":"# Useful Algorithms for Red Teams\n\n![Logo](./logo.png)\n\n![Rust](https://img.shields.io/badge/rust-1.0-blue.svg)\n\nWelcome to the **Useful Algorithms for Red Teams** project! This repository is a collection of essential algorithms and tools tailored for offensive security professionals, specifically red teams. Each project demonstrates a different aspect of cybersecurity attack techniques, from network sniffing to password brute forcing, all implemented in Rust for optimal performance and security.\n\n## Table of Contents\n- [Projects](#projects)\n  - [Port Scanner](#1-port-scanner)\n  - [Password Brute Forcing](#2-password-brute-forcing)\n  - [SQL Injector Tester](#3-sql-injector-tester)\n  - [Subdomain Enumeration](#4-subdomain-enumeration)\n  - [ARP Spoofing](#5-arp-spoofing)\n  - [DNS Spoofing](#6-dns-spoofing)\n  - [Buffer Overflow Exploitation](#7-buffer-overflow-exploitation)\n  - [Network Sniffing](#8-network-sniffing)\n  - [Shellcode Injection](#9-shellcode-injection)\n  - [Credential Dumping](#10-credential-dumping)\n- [Installation](#installation)\n- [Usage](#usage)\n- [Contributing](#contributing)\n- [License](#license)\n\n## Projects\n\n### 1. Port Scanner\n- **Description:** Performs a TCP SYN scan to identify open ports on a target system.\n- **Repository:** [Port Scanner](https://github.com/copyleftdev/port-scanner)\n- **Usage:** Run the tool to scan a range of ports on a specified target IP.\n\n### 2. Password Brute Forcing\n- **Description:** Attempts to crack passwords by generating and testing possible combinations.\n- **Repository:** [Password Brute Forcing](https://github.com/copyleftdev/password-brute)\n- **Usage:** Provide the target hash and run the tool to attempt to find the matching password.\n\n### 3. SQL Injector Tester\n- **Description:** Tests for SQL injection vulnerabilities by injecting payloads into web applications.\n- **Repository:** [SQL Injector Tester](https://github.com/copyleftdev/sql-injector-tester)\n- **Usage:** Run the tool against a target URL to detect potential SQL injection vulnerabilities.\n\n### 4. Subdomain Enumeration\n- **Description:** Enumerates subdomains for a given domain to find potential attack vectors.\n- **Repository:** [Subdomain Enumeration](https://github.com/copyleftdev/enumerate-subdomains)\n- **Usage:** Specify the target domain and run the tool to discover subdomains.\n\n### 5. ARP Spoofing\n- **Description:** Intercepts network traffic by spoofing ARP packets.\n- **Repository:** [ARP Spoofing](https://github.com/copyleftdev/arp-spoofing)\n- **Usage:** Run the tool on a local network to start ARP spoofing.\n\n### 6. DNS Spoofing\n- **Description:** Redirects DNS queries to a malicious server.\n- **Repository:** [DNS Spoofing](https://github.com/copyleftdev/dns-spoofing)\n- **Usage:** Run the tool to start spoofing DNS responses.\n\n### 7. Buffer Overflow Exploitation\n- **Description:** Demonstrates how to exploit a buffer overflow vulnerability.\n- **Repository:** [Buffer Overflow Exploitation](https://github.com/copyleftdev/buffer-overflow)\n- **Usage:** Run the tool with the appropriate payload to exploit the vulnerability.\n\n### 8. Network Sniffing\n- **Description:** Captures network packets for analysis.\n- **Repository:** [Network Sniffing](https://github.com/copyleftdev/network-sniff)\n- **Usage:** Run the tool to start capturing packets on the network interface.\n\n### 9. Shellcode Injection\n- **Description:** Injects and executes shellcode within a running process.\n- **Repository:** [Shellcode Injection](https://github.com/copyleftdev/shell-code)\n- **Usage:** Provide the shellcode and run the tool to perform the injection.\n\n### 10. Credential Dumping\n- **Description:** Extracts credentials from a target system.\n- **Repository:** [Credential Dumping](https://github.com/copyleftdev/credential-dumping)\n- **Usage:** Run the tool to dump credentials from the target system.\n\n## Installation\n\nEach project is a separate Rust application. To get started, navigate to the desired project directory and build it using Cargo.\n\n```sh\ncd \u003cproject-directory\u003e\ncargo build --release\n```\n\n## Usage\n\nTo run any of the tools, navigate to the specific project directory and execute the compiled binary.\n\n```sh\ncd \u003cproject-directory\u003e\ncargo run --release\n```\n\n## Contributing\n\nContributions are welcome! If you have a new algorithm or improvement, feel free to fork this repository and submit a pull request.\n\n## License\n\nThis project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcopyleftdev%2Fuse-algos-for-red-team","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcopyleftdev%2Fuse-algos-for-red-team","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcopyleftdev%2Fuse-algos-for-red-team/lists"}