Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-red-teaming
List of red team resources
https://github.com/an4kein/awesome-red-teaming
Last synced: 2 days ago
JSON representation
-
[↑](#table-of-contents) Lateral movement
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- Eventvwr File-less UAC Bypass CNA
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- My First Go with BloodHound
- OPSEC Considerations for beacon commands
- Agentless Post Exploitation
- Windows Access Tokens and Alternate credentials
- PSAmsi - An offensive PowerShell module for interacting with the Anti-Malware Scan Interface in Windows 10
- Lay of the Land with BloodHound
- A Guide to Configuring Throwback
- Using SQL Server for attacking a Forest Trust
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Window 10 Device Guard Bypass
- PSAmsi - An offensive PowerShell module for interacting with the Anti-Malware Scan Interface in Windows 10
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- A Guide to Configuring Throwback
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- Lateral movement using excel application and dcom
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- Lay of the Land with BloodHound
- Bringing the hashes home with reGeorg & Empire
- Intercepting passwords with Empire and winning
- Outlook Home Page – Another Ruler Vector
- Outlook Forms and Shells
- Windows Privilege Escalation Checklist
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- A Guide to Configuring Throwback
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
-
[↑](#table-of-contents) Command and Control
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- How to Build a C2 Infrastructure with Digital Ocean – Part 1
- Infrastructure for Ongoing Red Team Operations
- Automated Red Team Infrastructure Deployment with Terraform - Part 1
- Red Teaming for Pacific Rim CCDC 2017
- How I Prepared to Red Team at PRCCDC 2015
- High-reputation Redirectors and Domain Fronting
- The PlugBot: Hardware Botnet Research Project
- Attack Infrastructure Log Aggregation and Monitoring
- Migrating Your infrastructure
- Redirecting Cobalt Strike DNS Beacons
- Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike
- Escape and Evasion Egressing Restricted Networks - Tom Steele and Chris Patten
- Automated Red Team Infrastructure Deployment with Terraform - Part 1
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Finding Frontable Domain
- Apache2Mod Rewrite Setup
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Red Teaming for Pacific Rim CCDC 2016
- Randomized Malleable C2 Profiles Made Easy
- Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite - Jeff Dimmock
- TOR Fronting – Utilising Hidden Services for Privacy
- Domain Fronting Via Cloudfront Alternate Domains
- Attack Infrastructure Log Aggregation and Monitoring
- Empre Domain Fronting
- Redirecting Cobalt Strike DNS Beacons
- Finding Domain frontable Azure domains - thoth / Fionnbharr (@a_profligate)
- Command and Control Using Active Directory
- C2 with twitter
- C2 with DNS
- ICMP C2
- C2 with Dropbox
- C2 with https
- C2 with webdav
- C2 with gmail
- “Tasking” Office 365 for Cobalt Strike C2
- Simple domain fronting PoC with GAE C2 server
- Using WebDAV features as a covert channel
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
- Attack Infrastructure Log Aggregation and Monitoring
- Redirecting Cobalt Strike DNS Beacons
-
[↑](#table-of-contents) Social Engineering
- 7 Best social Engineering attack
- OWASP Presentation of Social Engineering - OWASP
- USB Drop Attacks: The Danger of “Lost And Found” Thumb Drives
- Best Time to send email
- PyPhishing Toolkit
- OWASP Presentation of Social Engineering - OWASP
- Best Time to send email
- Social Engineer Portal
- Using Social Engineering Tactics For Big Data Espionage - RSA Conference Europe 2012
- Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter - Defcon 23
-
[↑](#table-of-contents) Delivery
- Cobalt Strike - Spear Phishing documentation
- Cobalt Strike Blog - What's the go-to phishing technique or exploit?
- EMAIL RECONNAISSANCE AND PHISHING TEMPLATE GENERATION MADE SIMPLE
- An unnecessary addiction to DNS communication
- Empire & Tool Diversity: Integration is Key
- EGRESSING BLUECOAT WITH COBALTSTIKE & LET'S ENCRYPT
- EMAIL RECONNAISSANCE AND PHISHING TEMPLATE GENERATION MADE SIMPLE
- Empire & Tool Diversity: Integration is Key
- VEIL-EVASION AES ENCRYPTED HTTPKEY REQUEST: SAND-BOX EVASION
- Spear phishing with Cobalt Strike - Raphael Mudge
- Phishing Against Protected View
- POWERSHELL EMPIRE STAGERS 1: PHISHING WITH AN OFFICE MACRO AND EVADING AVS
- Phishing with PowerPoint
- PHISHING WITH EMPIRE
- EMAIL RECONNAISSANCE AND PHISHING TEMPLATE GENERATION MADE SIMPLE
- EMAIL RECONNAISSANCE AND PHISHING TEMPLATE GENERATION MADE SIMPLE
-
[↑](#table-of-contents) Implant Creation
- Exploiting CVE-2017-0199: HTA Handler Vulnerability
- Wepwnise
- Bash Bunny
- How To: Empire’s Cross Platform Office Macro
- Excel macros with PowerShell
- PowerPoint and Custom Actions
- Hiding your process from sysinternals
- Luckystrike: An Evil Office Document Generator
- Multi-Platform Macro Phishing Payloads
- Macroless DOC malware that avoids detection with Yara rule
- AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
- CVE-2017-0199 Toolkit
- CVE-2017-8759-Exploit-sample
- Window Signed Binary
- Generate Macro - Tool
- MS Signed mimikatz in just 3 steps
- The Absurdly Underestimated Dangers of CSV Injection
- Macro-less Code Exec in MSWord
- Empire without powershell
- Powershell without Powershell to bypass app whitelist
- Phishing between the app whitelists
- Bypass Application Whitelisting Script Protections - Regsvr32.exe & COM Scriptlets (.sct files)
- Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations
- Windows oneliners to download remote payload and execute arbitrary code
- Week of Evading Microsoft ATA - Announcement and Day 1 to Day 5
- PowerPoint and Custom Actions
-
[↑](#table-of-contents) Embedded and Peripheral Devices Hacking
- Gettting in with the Proxmark3 & ProxBrute
- Practical Guide to RFID Badge copying
- MagSpoof - credit card/magstripe spoofer
- Contents of a Physical Pentester Backpack
- Wireless Keyboard Sniffer
- RFID Hacking with The Proxmark 3
- Swiss Army Knife for RFID
- Exploring NFC Attack Surface
- Outsmarting smartcards
- Reverse engineering HID iClass Master keys
- Android Open Pwn Project (AOPP)
-
[↑](#table-of-contents) Misc
-
[↑](#table-of-contents) Ebooks
-
[↑](#table-of-contents) Training ( Free )
-
[↑](#table-of-contents) OSINT
- Awesome list of OSINT - A lot of awesome OSINT resources are already covered
- Reconnaissance using LinkedInt
-
[↑](#table-of-contents) Certification
Programming Languages
Categories
[↑](#table-of-contents) Lateral movement
179
[↑](#table-of-contents) Command and Control
137
[↑](#table-of-contents) Implant Creation
26
[↑](#table-of-contents) Delivery
16
[↑](#table-of-contents) Embedded and Peripheral Devices Hacking
11
[↑](#table-of-contents) Social Engineering
10
[↑](#table-of-contents) Ebooks
5
[↑](#table-of-contents) Certification
3
[↑](#table-of-contents) Misc
3
[↑](#table-of-contents) OSINT
2
[↑](#table-of-contents) Training ( Free )
2
Sub Categories