takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities
-
Updated
Mar 1, 2026 - C
takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities
A comprehensive cheatsheet and learning resource created during CRTO preparation after extensive lab practice. This repository contains battle-tested commands, techniques, and methodologies that work in modern enterprise environments.
(WIP) Airgapped Stealth HID RCE bypassing IDS, IPS, ACL and Firewall using a cellular modem for outside communication and data exfiltration
ExploitHawk is a powerful terminal-based exploit search tool for ethical hacking and red team operations, designed for Linux distributions(Debian, Rhel, Arch)
🛠️ Discover exploits quickly with ExploitHawk, a terminal-based tool for ethical hacking across Linux distributions, offering fast, accurate search results.
(WIP) Overthrone - The First All-Rust autonomous Active Directory exploitation framework. A single static binary that takes you from network access to Domain Admin to finished report — zero external dependencies, pure native protocol implementations, full kill-chain automation. No Python. No .NET. No mercy.
Add a description, image, and links to the redteaming-tool topic page so that developers can more easily learn about it.
To associate your repository with the redteaming-tool topic, visit your repo's landing page and select "manage topics."