This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
☆16Aug 16, 2022Updated 3 years ago
Alternatives and similar repositories for Red-Teaming-Toolkit
Users that are interested in Red-Teaming-Toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆33Aug 25, 2021Updated 4 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 3 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10May 30, 2021Updated 4 years ago
- ☆41Jul 30, 2023Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- ☆21Jul 26, 2022Updated 3 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆11Dec 7, 2025Updated 5 months ago
- ☆78Apr 25, 2023Updated 3 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆19Jun 22, 2022Updated 3 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆18Sep 12, 2017Updated 8 years ago
- ☆20May 18, 2022Updated 3 years ago
- ☆18Jun 16, 2021Updated 4 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- My CEH Practical Preparation☆24Mar 16, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hackthebox, Vulnhub, TryHackMe and Real World PenTest☆126Sep 8, 2020Updated 5 years ago
- ☆489Aug 12, 2022Updated 3 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- A curated list of amazingly libraries, services and resources to work with PDF files☆17Apr 13, 2026Updated last month
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- ☆111May 30, 2021Updated 4 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated last month
- ☆760Aug 26, 2022Updated 3 years ago
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- Find hidden directories from domain and subdomain.☆11Mar 27, 2022Updated 4 years ago
- Bash script to generate reverse shell payloads☆18Sep 9, 2023Updated 2 years ago
- Yellow Server☆12Apr 12, 2026Updated last month
- random scripts☆17Nov 10, 2024Updated last year
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 5 years ago
- Automated authorization checks with multiple headers tool written in golang☆11Jan 3, 2024Updated 2 years ago