RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.
☆18Nov 12, 2025Updated 6 months ago
Alternatives and similar repositories for rusthunter
Users that are interested in rusthunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆75Apr 25, 2023Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Jan 5, 2022Updated 4 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Resources for Code Cafe Online 4th May 2020☆11May 5, 2020Updated 6 years ago
- Tools for attacking Computer Use Agents☆31Jan 16, 2026Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆15Jan 14, 2021Updated 5 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 5 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71May 27, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Red Team Templates For Obsidian.md☆35Jan 7, 2022Updated 4 years ago
- obuscate python source code 混淆 python 源代码的小工具☆17Sep 30, 2019Updated 6 years ago
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- shellinabox for docker based on alpine linux☆12Sep 17, 2021Updated 4 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆49Aug 30, 2023Updated 2 years ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆136Jan 29, 2026Updated 3 months ago
- Public BanditFuzz Repo☆12Jan 12, 2021Updated 5 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- ☆36May 27, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Oct 22, 2019Updated 6 years ago
- Secretly record audio and video with chromium based browsers.☆24Feb 14, 2024Updated 2 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 6 months ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆81Oct 27, 2025Updated 6 months ago
- ☆14Sep 13, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆95Apr 1, 2026Updated last month
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆114Apr 28, 2026Updated 3 weeks ago
- A tool to check for rogue/orphaned AWS services running that cost money☆14Dec 21, 2017Updated 8 years ago
- AI-based Ludus range configuration builder☆29May 6, 2025Updated last year
- ☆23Nov 29, 2023Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago