takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities
-
Updated
Mar 1, 2026 - C
takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities
A comprehensive cheatsheet and learning resource created during CRTO preparation after extensive lab practice. This repository contains battle-tested commands, techniques, and methodologies that work in modern enterprise environments.
(WIP) Airgapped Stealth HID RCE bypassing IDS, IPS, ACL and Firewall using a cellular modem for outside communication and data exfiltration
🛠️ Discover exploits quickly with ExploitHawk, a terminal-based tool for ethical hacking across Linux distributions, offering fast, accurate search results.
(WIP) Overthrone - The First All-Rust Active Directory exploitation framework. A single static binary that takes you from network access to Domain Admin to finished report - zero external dependencies, pure native protocol implementations, full kill-chain. No Python. No .NET. No mercy.
Add a description, image, and links to the redteaming-tool topic page so that developers can more easily learn about it.
To associate your repository with the redteaming-tool topic, visit your repo's landing page and select "manage topics."