Multilayered AV/EDR Evasion Framework
-
Updated
Sep 6, 2025 - C++
Multilayered AV/EDR Evasion Framework
A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions
Repo containing cracked red teaming tools.
A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embedded in webpages, parsing resources like sitemaps and robots.txt files, and even processing local files - to uncover every URL.
Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷
Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for complex T-SQL queries.
Manual Prompt Injection / Red Teaming Tool
Sh3ller is a lightweight C2 framework in its simplest form.
Response Filter Denial of Service (RFDoS) Experimental Scanner
Pdf-exploit builder Non-Silent on C#
A community package-based python wrapper that simplifies carrying out scans, and pentests upon certain scope while performing security penetration testing and researches.
Powerful Bash-based subdomain enumeration tool for recon, bug bounty, and red teaming — integrates Subfinder, Amass, httpx & more.
📍 [WIP] Bypass CDN/WAFs!
RTO Exam notes and tools, get your Red Team Operations by Zero-Point Security.
A hands-on repository for beginners who want to explore and experiment with red teaming and offensive security methods.
InjectionLab is an educational toolkit showcasing various Windows code injection techniques. It provides well-documented examples for security researchers and defenders to explore process injection, memory manipulation, and detection strategies.
The Passive Company Scanner is a passive vulnerability scanning tool. By entering a company's name, it identifies associated IP addresses and gathers information on open ports, vulnerabilities, and more. It uses non-invasive techniques to map the attack surface without directly interacting with the targets.
Add a description, image, and links to the red-teaming-tools topic page so that developers can more easily learn about it.
To associate your repository with the red-teaming-tools topic, visit your repo's landing page and select "manage topics."