☆109Feb 14, 2026Updated 2 months ago
Alternatives and similar repositories for RTOps-Management-Platform
Users that are interested in RTOps-Management-Platform are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆61Feb 23, 2026Updated 2 months ago
- ☆20Sep 2, 2021Updated 4 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Jun 16, 2024Updated last year
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆155Jan 25, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆70Oct 20, 2025Updated 6 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 3 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated last year
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆79Dec 2, 2024Updated last year
- Red Team AI prompts☆49Dec 2, 2025Updated 4 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Aug 7, 2024Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆17Jun 25, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆639Sep 20, 2025Updated 7 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆32Oct 7, 2024Updated last year
- Backend development stack for agents☆29Jul 30, 2025Updated 8 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- A BloodHound collector for Microsoft Configuration Manager☆399Jul 7, 2025Updated 9 months ago
- ☆13Feb 18, 2024Updated 2 years ago
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- test☆61Updated this week
- Analyze Android native `.so` files☆122Jul 28, 2025Updated 9 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- ☆61Dec 13, 2025Updated 4 months ago
- ☆29May 16, 2023Updated 2 years ago
- A real fake social engineering app☆128Jul 13, 2025Updated 9 months ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆13Jul 23, 2025Updated 9 months ago
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆62Apr 17, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. Based on the original GodPotato PoC by …☆212Apr 16, 2026Updated last week
- ☆44Apr 13, 2026Updated 2 weeks ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆69Jan 12, 2026Updated 3 months ago
- Escaping Restricted Environments and Bypassing DLP☆79Jan 22, 2019Updated 7 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- ☆13May 27, 2020Updated 5 years ago
- SAM Dumping in C#☆55Nov 27, 2025Updated 5 months ago