RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.
☆18Nov 12, 2025Updated 3 months ago
Alternatives and similar repositories for rusthunter
Users that are interested in rusthunter are comparing it to the libraries listed below
Sorting:
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Persistent twitter monitor tool for 2021 SANS OSINT Summit Talk☆18Mar 3, 2022Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71May 27, 2021Updated 4 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Apr 11, 2023Updated 2 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Feb 22, 2024Updated 2 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆47Mar 13, 2023Updated 2 years ago
- Secretly record audio and video with chromium based browsers.☆23Feb 14, 2024Updated 2 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 2 weeks ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆23Feb 27, 2024Updated 2 years ago
- Open Source Vulnerability Disclosure Program☆24Oct 29, 2021Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- ☆36May 27, 2024Updated last year
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- ☆27Mar 5, 2023Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago