Pinned Repositories
bitwarden-windows-hello
Tools to Exploit Bitwarden v2023.3.0 with Windows Hello
CVE-2020-13935
Exploit for WebSocket Vulnerability in Apache Tomcat
kbtls
Establishes mutually trusted TLS connections based on a pre-shared connection key.
monsoon
Fast HTTP enumerator
moodle-rce-calculatedquestions
Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)
postscript_blog_examples
PostScript examples useful for attacking Ghostscript.
pretender
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
remarkable-encryption
A document encryption solution for the reMarkable 2 ePaper tablet.
resocks
mTLS-Encrypted Back-Connect SOCKS5 Proxy
watchguard-sso-client
Client Implementation for the WatchGuard SSO Agent Protocol used for Security Research (CVE-2024-6592, CVE-2024-6593, CVE-2024-6594)
RedTeam Pentesting GmbH's Repositories
RedTeamPentesting/pretender
Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.
RedTeamPentesting/monsoon
Fast HTTP enumerator
RedTeamPentesting/resocks
mTLS-Encrypted Back-Connect SOCKS5 Proxy
RedTeamPentesting/CVE-2020-13935
Exploit for WebSocket Vulnerability in Apache Tomcat
RedTeamPentesting/remarkable-encryption
A document encryption solution for the reMarkable 2 ePaper tablet.
RedTeamPentesting/kbtls
Establishes mutually trusted TLS connections based on a pre-shared connection key.
RedTeamPentesting/bitwarden-windows-hello
Tools to Exploit Bitwarden v2023.3.0 with Windows Hello
RedTeamPentesting/moodle-rce-calculatedquestions
Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)
RedTeamPentesting/postscript_blog_examples
PostScript examples useful for attacking Ghostscript.
RedTeamPentesting/watchguard-sso-client
Client Implementation for the WatchGuard SSO Agent Protocol used for Security Research (CVE-2024-6592, CVE-2024-6593, CVE-2024-6594)
RedTeamPentesting/CVE-2023-33243
PoC for login with password hash in STARFACE
RedTeamPentesting/.github