https://github.com/Orange-Cyberdefense/arsenal
In arsenal you can search for a command, select one and it's prefilled directly in your terminal. This functionality is independent of the shell used. Indeed arsenal emulates real user input (with TTY arguments and IOCTL) so arsenal works with all shells and your commands will be in the history.
You have to enter arguments if needed, but arsenal supports global variables.For example, during a pentest we can set the variable ip
to prefill all commands using an ip with the right one.
https://github.com/sneakerhax/TTPs
Resources to define, understand the execution, and goals of Red Teaming. These resources have an emphasis on Enterprise Red Teaming in the cloud
Trickest | Offensive Security Automation
All sorts of tools for automation of various offensive things
GitHub - 0xor0ne/awesome-list: Cybersecurity oriented awesome list