https://github.com/copyleftdev/use-algos-for-red-team

repo with some cool samples projects for tooling up

https://github.com/copyleftdev/use-algos-for-red-team

Science Score: 13.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
  • DOI references
  • Academic publication links
  • Committers with academic emails
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (7.8%) to scientific vocabulary

Keywords

bounty-hunting-tools offensive-security red-teaming redteam rust shell-code sql-injection-exploitation
Last synced: 5 months ago · JSON representation

Repository

repo with some cool samples projects for tooling up

Basic Info
  • Host: GitHub
  • Owner: copyleftdev
  • License: other
  • Default Branch: main
  • Homepage:
  • Size: 1.46 MB
Statistics
  • Stars: 0
  • Watchers: 1
  • Forks: 0
  • Open Issues: 0
  • Releases: 0
Topics
bounty-hunting-tools offensive-security red-teaming redteam rust shell-code sql-injection-exploitation
Created over 1 year ago · Last pushed over 1 year ago
Metadata Files
Readme License

readme.md

Useful Algorithms for Red Teams

Logo

Rust

Welcome to the Useful Algorithms for Red Teams project! This repository is a collection of essential algorithms and tools tailored for offensive security professionals, specifically red teams. Each project demonstrates a different aspect of cybersecurity attack techniques, from network sniffing to password brute forcing, all implemented in Rust for optimal performance and security.

Table of Contents

Projects

1. Port Scanner

  • Description: Performs a TCP SYN scan to identify open ports on a target system.
  • Repository: Port Scanner
  • Usage: Run the tool to scan a range of ports on a specified target IP.

2. Password Brute Forcing

  • Description: Attempts to crack passwords by generating and testing possible combinations.
  • Repository: Password Brute Forcing
  • Usage: Provide the target hash and run the tool to attempt to find the matching password.

3. SQL Injector Tester

  • Description: Tests for SQL injection vulnerabilities by injecting payloads into web applications.
  • Repository: SQL Injector Tester
  • Usage: Run the tool against a target URL to detect potential SQL injection vulnerabilities.

4. Subdomain Enumeration

  • Description: Enumerates subdomains for a given domain to find potential attack vectors.
  • Repository: Subdomain Enumeration
  • Usage: Specify the target domain and run the tool to discover subdomains.

5. ARP Spoofing

  • Description: Intercepts network traffic by spoofing ARP packets.
  • Repository: ARP Spoofing
  • Usage: Run the tool on a local network to start ARP spoofing.

6. DNS Spoofing

  • Description: Redirects DNS queries to a malicious server.
  • Repository: DNS Spoofing
  • Usage: Run the tool to start spoofing DNS responses.

7. Buffer Overflow Exploitation

  • Description: Demonstrates how to exploit a buffer overflow vulnerability.
  • Repository: Buffer Overflow Exploitation
  • Usage: Run the tool with the appropriate payload to exploit the vulnerability.

8. Network Sniffing

  • Description: Captures network packets for analysis.
  • Repository: Network Sniffing
  • Usage: Run the tool to start capturing packets on the network interface.

9. Shellcode Injection

  • Description: Injects and executes shellcode within a running process.
  • Repository: Shellcode Injection
  • Usage: Provide the shellcode and run the tool to perform the injection.

10. Credential Dumping

  • Description: Extracts credentials from a target system.
  • Repository: Credential Dumping
  • Usage: Run the tool to dump credentials from the target system.

Installation

Each project is a separate Rust application. To get started, navigate to the desired project directory and build it using Cargo.

sh cd <project-directory> cargo build --release

Usage

To run any of the tools, navigate to the specific project directory and execute the compiled binary.

sh cd <project-directory> cargo run --release

Contributing

Contributions are welcome! If you have a new algorithm or improvement, feel free to fork this repository and submit a pull request.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Owner

  • Name: Donald Johnson
  • Login: copyleftdev
  • Kind: user
  • Location: Los Angeles

GitHub Events

Total
Last Year

Committers

Last synced: 7 months ago

All Time
  • Total Commits: 6
  • Total Committers: 1
  • Avg Commits per committer: 6.0
  • Development Distribution Score (DDS): 0.0
Past Year
  • Commits: 6
  • Committers: 1
  • Avg Commits per committer: 6.0
  • Development Distribution Score (DDS): 0.0
Top Committers
Name Email Commits
Don Johnson dj@c****o 6
Committer Domains (Top 20 + Academic)

Issues and Pull Requests

Last synced: 7 months ago

All Time
  • Total issues: 0
  • Total pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Total issue authors: 0
  • Total pull request authors: 0
  • Average comments per issue: 0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 0
  • Pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Issue authors: 0
  • Pull request authors: 0
  • Average comments per issue: 0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
Pull Request Authors
Top Labels
Issue Labels
Pull Request Labels