The WASM Based Security Toolkit for the Web First Paradigm
☆36Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for RedTeamToolkit
Users that are interested in RedTeamToolkit are comparing it to the libraries listed below
Sorting:
- A passive network discovery tool that finds live network nodes by analyzing ARP and broadcast packets.☆14Dec 11, 2012Updated 13 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Thymeleaf SSTI Bypass☆13Nov 24, 2021Updated 4 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- gocewl is a commandline tool to generate custom wordlists by crawling webpages☆47Apr 28, 2020Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆18May 27, 2022Updated 3 years ago
- ☆28Sep 16, 2020Updated 5 years ago
- 一 款利用某云厂商的物联网平台作为c2的框架☆23Jun 18, 2023Updated 2 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to dete…☆21Apr 19, 2023Updated 2 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- ☆10Jul 19, 2019Updated 6 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Basic Windows 32-bit debugger with special functions like directory monitoring and DLL injection☆14Mar 7, 2019Updated 7 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆11Nov 28, 2024Updated last year
- bWAPP Docker Image☆53Feb 1, 2022Updated 4 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- Webapplication Honeypot☆15May 12, 2013Updated 12 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Aug 18, 2021Updated 4 years ago
- git clone all repositories and gists from a given GitHub username☆32Feb 27, 2026Updated 3 weeks ago