Red Squad
Ctrlk
BuyMeACoffee
  • 🏠/home/red-squad
    • ⏰Recently Added
    • πŸ₯³Support our projects
    • ⚰️Is There Life After Death ?
  • 🌐Web Hacking
    • 🚩CTFs shortcuts
    • πŸ—ΊοΈAudits plan
    • πŸ•΅οΈOSINT
    • Enumeration
    • πŸ”—HTTP Stuff
    • πŸ”Sessions / Tokens
    • πŸ’‰Injections
    • πŸͺ±Web Vulnerabilities
    • β›”WAF Bypass
    • ✍️Servers / CMS
    • πŸ–‡οΈAPI
  • 🐧Linux Hacking
    • πŸ§—Privilege Escalation
    • πŸ‘£Cover tracks
    • πŸšͺBackdoors
    • β­•Reverse Shells
    • πŸ”’Compiled Binaries
    • 🌊Buffer Overflow
    • 🐳Docker Escape
    • 🀝File sharing
  • πŸͺŸWindows Hacking
    • πŸ‘₯Active Directory
    • πŸ’‘Useful AD Commands
    • πŸ§—Privilege Escalation
    • 🐚Shells
    • πŸ”“Bypasses
    • πŸ“ƒOffice
    • πŸ‘©β€πŸ’»SCCM | MECM
    • πŸ’ŽMicrosoft 365
  • πŸ’½Systems
    • πŸ•β€πŸ¦ΊServices Enumeration
    • πŸ–¨οΈPrinters
    • πŸ›‘οΈFortinet
    • πŸ“ΉCCTV / IP Cameras
  • πŸŽ†Networks
    • πŸŒͺ️Pivoting
    • πŸ”₯Firewalls
    • πŸ”—Proxies
  • πŸ“±Mobile Hacking
    • πŸ€–Android
    • 🍏iOS
    • πŸ“ΊIOT
  • Configuration
    • ChromeOS
    • Mobile
    • IBM
  • πŸ“‘Wireless Hacking
    • πŸŽ†Wi-Fi Attacks
    • 🫐Bluetooth
  • πŸ‘¨β€πŸ’»Code Audit
    • βœ”οΈBest Practices
    • ❌Bad Practices
    • βš’οΈTools
  • πŸ‘Thick Client Hacking
    • πŸ“Thick Client Pentesting Methodology
    • πŸ—„οΈResources
  • πŸ—„οΈMISC
    • πŸ”‘Default Credentials
    • πŸ”»CVEs
    • 🦊Browser Extensions
    • πŸ€–AI
    • πŸ”­Hacking Labs
    • πŸ”«Exploitation Frameworks
  • πŸ•΅οΈOPSEC
    • πŸ—οΈPrivacy
  • πŸ”‘CRACKING | ENCODING
    • πŸ₯ŠBruteforce tools
    • πŸ“Wordlists
    • 🧨Cracking Tools
    • πŸ”¬Encoding | Decoding Tools
    • πŸ”Steganography | Cipher
  • πŸ”΄RED TEAM
    • πŸ“₯Password Extract
    • πŸ•΅οΈSpy cam
    • πŸ”’Lock Picking
    • 🎣Phishing
  • πŸŒ€Whistle Blowing
    • πŸ“ΉCCTV
  • πŸ”΅BLUE TEAM
    • 🧩Forensics
    • 🦹Malware Analysis
    • πŸ› οΈTools
    • 🍯HoneyPots
    • πŸŽ†Networks Security
    • πŸͺ™Online IoC Scanners
  • 🐞Bug Bounty Related
    • Searching for CVEs
    • [FR] Legal
    • Dorks
  • πŸ–₯️DEVELOPERS
    • πŸ‘¨β€πŸ’»IDE
  • πŸ“šLEARNING
    • Windows
    • SQL
    • SSL/TLS
Powered by GitBook
On this page
Edit
  1. 🏠/home/red-squad

πŸ₯³Support our projects

LogoGitHub - saladandonionrings/NextGen-Spoofer: NextGenSpoofer is a Python ARP/DNS Spoofer made with love <3GitHub
ARP & DNS SPOOFER - Python
LogoGitHub - saladandonionrings/leaky: Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks β€” including stealer logs, credential dumps, and miscellaneous leak data β€” within a streamlined web interface powered by MongoDB.GitHub
LEAKY - for db leaks
LogoGitHub - saladandonionrings/NextGen-HeadersScanner: Python HTTP Security Header ScannerGitHub
HTTP SECURITY HEADERS SCANNER - Python
LogoGitHub - saladandonionrings/iOS-Binary-Security-Analyzer: Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.GitHub
IOS BINARY SECURITY ANALYZER - bash
PreviousRecently AddedNextIs There Life After Death ?

Last updated 2 years ago

Was this helpful?

Was this helpful?