A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.
☆33Mar 24, 2026Updated this week
Alternatives and similar repositories for B00t2R00t
Users that are interested in B00t2R00t are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 10 months ago
- ☆13Nov 27, 2020Updated 5 years ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆191Updated this week
- ☆24Mar 2, 2026Updated 3 weeks ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆50Jan 31, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Repository for tools used for the OSCP☆23Sep 18, 2025Updated 6 months ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated last year
- C programming☆17Oct 24, 2024Updated last year
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Offensive security toolkit for Claude Code☆77Updated this week
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆15Mar 10, 2025Updated last year
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Mar 18, 2026Updated last week
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Aug 4, 2025Updated 7 months ago
- Decrypt Chromium based browser passwords with PowerShell.☆135Nov 14, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 4 months ago
- A Python Implementation of XQ Message SDK (V.2) which provides convenient access to the XQ Message API.☆11Feb 18, 2026Updated last month
- A Selenium scraper for public domain search tools.☆18Oct 27, 2024Updated last year
- ☆127Updated this week
- AIGoat - Open-source AI security playground for LLM red teaming. AI Goat provides hands-on labs covering the full OWASP LLM Top 10 with p…☆35Updated this week
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 7 months ago
- ☆38Aug 6, 2025Updated 7 months ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆45Sep 25, 2024Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆99Dec 23, 2025Updated 3 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- Kerberos CNAME abuse PoC☆97Jan 27, 2026Updated 2 months ago
- Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse she…☆21Sep 22, 2024Updated last year
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆23Oct 31, 2024Updated last year
- A set of scripts to facilitate HTTP interception on mobile apps☆20Mar 11, 2026Updated 2 weeks ago
- A Ruby DSL for crafting SQL Injections☆46Jan 12, 2026Updated 2 months ago
- Exploit systems using older WinRAR without knowing their username (unlike other projects)☆35Aug 17, 2025Updated 7 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆13May 30, 2025Updated 9 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆32Mar 19, 2026Updated last week
- DeepSeek Pentest AI - Burp Suite extension☆58Sep 14, 2025Updated 6 months ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆15Apr 17, 2025Updated 11 months ago
- Script para la instalación automática de una capa de personalización en Kali Linux OS.☆17Mar 14, 2026Updated 2 weeks ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 3 weeks ago