Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-Operated, Offensive & Defensive Cyber Espionage & State Sponsored Attack Framework With Automated Red, Blue & Purple Team, Auditing & Reporting Capabilties.
☆20Feb 11, 2025Updated last year
Alternatives and similar repositories for Project-Red-Sword
Users that are interested in Project-Red-Sword are comparing it to the libraries listed below
Sorting:
- This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the dev…☆19Feb 20, 2026Updated last week
- A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deplo…☆78Feb 21, 2026Updated last week
- Complete Malware Index - Use at your own Risk!☆20Sep 2, 2024Updated last year
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- Automating the testing of prompt defenses.☆35Jan 28, 2024Updated 2 years ago
- ☆10Updated this week
- Secure and performant OCI-image builder for Kubernetes☆12Feb 19, 2026Updated last week
- ROBLOX Script - Collection of visuals / wall hacks (Tracers, ESP, Boxes (2D & 3D), Head Dots & Crosshair)☆15Feb 16, 2023Updated 3 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- A React component which can parse JSX and output rendered React Components.☆16May 21, 2019Updated 6 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- ☆18Feb 9, 2026Updated 2 weeks ago
- ☆13Feb 20, 2026Updated last week
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- The SDK assets for the XRTK☆10Sep 16, 2022Updated 3 years ago
- ☆11Jun 5, 2022Updated 3 years ago
- WiFi Pineapple Community Packages☆12Nov 6, 2022Updated 3 years ago
- ☆18Sep 9, 2025Updated 5 months ago
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 4 months ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- An OpenAPI specification for the Rocket.Chat API.☆10Updated this week
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated 11 months ago
- Unofficial Easypanel JS SDK☆13Nov 28, 2023Updated 2 years ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 9 months ago
- This repository contain all sources for Kaisen Linux alpha and beta ISO (packages, themes, icons, menus, launchers...)☆11Jun 8, 2020Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆45Apr 10, 2024Updated last year
- AI copilot for n8n.☆20Jun 25, 2025Updated 8 months ago
- ☆10Oct 12, 2021Updated 4 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year