An open API service indexing awesome lists of open source software.

https://github.com/copyleftdev/use-algos-for-red-team

repo with some cool samples projects for tooling up
https://github.com/copyleftdev/use-algos-for-red-team

bounty-hunting-tools offensive-security red-teaming redteam rust shell-code sql-injection-exploitation

Last synced: 3 months ago
JSON representation

repo with some cool samples projects for tooling up

Awesome Lists containing this project

README

        

# Useful Algorithms for Red Teams

![Logo](./logo.png)

![Rust](https://img.shields.io/badge/rust-1.0-blue.svg)

Welcome to the **Useful Algorithms for Red Teams** project! This repository is a collection of essential algorithms and tools tailored for offensive security professionals, specifically red teams. Each project demonstrates a different aspect of cybersecurity attack techniques, from network sniffing to password brute forcing, all implemented in Rust for optimal performance and security.

## Table of Contents
- [Projects](#projects)
- [Port Scanner](#1-port-scanner)
- [Password Brute Forcing](#2-password-brute-forcing)
- [SQL Injector Tester](#3-sql-injector-tester)
- [Subdomain Enumeration](#4-subdomain-enumeration)
- [ARP Spoofing](#5-arp-spoofing)
- [DNS Spoofing](#6-dns-spoofing)
- [Buffer Overflow Exploitation](#7-buffer-overflow-exploitation)
- [Network Sniffing](#8-network-sniffing)
- [Shellcode Injection](#9-shellcode-injection)
- [Credential Dumping](#10-credential-dumping)
- [Installation](#installation)
- [Usage](#usage)
- [Contributing](#contributing)
- [License](#license)

## Projects

### 1. Port Scanner
- **Description:** Performs a TCP SYN scan to identify open ports on a target system.
- **Repository:** [Port Scanner](https://github.com/copyleftdev/port-scanner)
- **Usage:** Run the tool to scan a range of ports on a specified target IP.

### 2. Password Brute Forcing
- **Description:** Attempts to crack passwords by generating and testing possible combinations.
- **Repository:** [Password Brute Forcing](https://github.com/copyleftdev/password-brute)
- **Usage:** Provide the target hash and run the tool to attempt to find the matching password.

### 3. SQL Injector Tester
- **Description:** Tests for SQL injection vulnerabilities by injecting payloads into web applications.
- **Repository:** [SQL Injector Tester](https://github.com/copyleftdev/sql-injector-tester)
- **Usage:** Run the tool against a target URL to detect potential SQL injection vulnerabilities.

### 4. Subdomain Enumeration
- **Description:** Enumerates subdomains for a given domain to find potential attack vectors.
- **Repository:** [Subdomain Enumeration](https://github.com/copyleftdev/enumerate-subdomains)
- **Usage:** Specify the target domain and run the tool to discover subdomains.

### 5. ARP Spoofing
- **Description:** Intercepts network traffic by spoofing ARP packets.
- **Repository:** [ARP Spoofing](https://github.com/copyleftdev/arp-spoofing)
- **Usage:** Run the tool on a local network to start ARP spoofing.

### 6. DNS Spoofing
- **Description:** Redirects DNS queries to a malicious server.
- **Repository:** [DNS Spoofing](https://github.com/copyleftdev/dns-spoofing)
- **Usage:** Run the tool to start spoofing DNS responses.

### 7. Buffer Overflow Exploitation
- **Description:** Demonstrates how to exploit a buffer overflow vulnerability.
- **Repository:** [Buffer Overflow Exploitation](https://github.com/copyleftdev/buffer-overflow)
- **Usage:** Run the tool with the appropriate payload to exploit the vulnerability.

### 8. Network Sniffing
- **Description:** Captures network packets for analysis.
- **Repository:** [Network Sniffing](https://github.com/copyleftdev/network-sniff)
- **Usage:** Run the tool to start capturing packets on the network interface.

### 9. Shellcode Injection
- **Description:** Injects and executes shellcode within a running process.
- **Repository:** [Shellcode Injection](https://github.com/copyleftdev/shell-code)
- **Usage:** Provide the shellcode and run the tool to perform the injection.

### 10. Credential Dumping
- **Description:** Extracts credentials from a target system.
- **Repository:** [Credential Dumping](https://github.com/copyleftdev/credential-dumping)
- **Usage:** Run the tool to dump credentials from the target system.

## Installation

Each project is a separate Rust application. To get started, navigate to the desired project directory and build it using Cargo.

```sh
cd
cargo build --release
```

## Usage

To run any of the tools, navigate to the specific project directory and execute the compiled binary.

```sh
cd
cargo run --release
```

## Contributing

Contributions are welcome! If you have a new algorithm or improvement, feel free to fork this repository and submit a pull request.

## License

This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.