The WASM Based Security Toolkit for the Web First Paradigm
☆36Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for RedTeamToolkit
Users that are interested in RedTeamToolkit are comparing it to the libraries listed below
Sorting:
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A passive network discovery tool that finds live network nodes by analyzing ARP and broadcast packets.☆14Dec 11, 2012Updated 13 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 2 months ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Aug 1, 2018Updated 7 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 4 years ago
- Credential and sensitive information harvester for kubernetes environments.☆11Mar 2, 2021Updated 4 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆11Nov 21, 2022Updated 3 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- auto MITM attack tools☆13Oct 11, 2023Updated 2 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Thymeleaf SSTI Bypass☆13Nov 24, 2021Updated 4 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Mar 26, 2020Updated 5 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- An extension which allows you to quickly & easily generate email aliases.☆18Apr 19, 2023Updated 2 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- WHY?☆18Sep 4, 2016Updated 9 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆21Aug 17, 2024Updated last year
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- ☆25May 6, 2025Updated 9 months ago