☆110Feb 14, 2026Updated 3 months ago
Alternatives and similar repositories for RTOps-Management-Platform
Users that are interested in RTOps-Management-Platform are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆62Feb 23, 2026Updated 2 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆162Jan 25, 2026Updated 3 months ago
- ☆20Sep 2, 2021Updated 4 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆70May 6, 2026Updated 2 weeks ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆58Dec 31, 2025Updated 4 months ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆79Dec 2, 2024Updated last year
- Red Team AI prompts☆50Dec 2, 2025Updated 5 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Aug 7, 2024Updated last year
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆17Jun 25, 2025Updated 10 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆653Sep 20, 2025Updated 7 months ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆32Oct 7, 2024Updated last year
- Backend development stack for agents☆29Jul 30, 2025Updated 9 months ago
- A BloodHound collector for Microsoft Configuration Manager☆401Jul 7, 2025Updated 10 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 5 months ago
- ☆13Feb 18, 2024Updated 2 years ago
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- Analyze Android native `.so` files☆123Jul 28, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆260Nov 3, 2025Updated 6 months ago
- ☆61Dec 13, 2025Updated 5 months ago
- ☆29May 16, 2023Updated 3 years ago
- A real fake social engineering app☆128Jul 13, 2025Updated 10 months ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 3 years ago
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆14Jul 23, 2025Updated 9 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆72Apr 17, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by …☆228Apr 16, 2026Updated last month
- ☆44Apr 13, 2026Updated last month
- A lightweight Windows Prefetch file parser to extract programs' execution history☆69Jan 12, 2026Updated 4 months ago
- Escaping Restricted Environments and Bypassing DLP☆78Jan 22, 2019Updated 7 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 11 months ago
- ☆38Jan 30, 2025Updated last year