Emulate and Dissect MSF and *other* attacks
☆143Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for REW-sploit
Users that are interested in REW-sploit are comparing it to the libraries listed below
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- High speed/Low cost CommonCrawl RegExp in Node.js☆257Apr 6, 2024Updated last year
- Phishing Framework for Pentesters☆201May 16, 2023Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Apr 20, 2021Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆360May 31, 2024Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆208Apr 3, 2025Updated 11 months ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated 3 weeks ago
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,218Feb 3, 2025Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆1,005Apr 6, 2024Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Core A2P2V functionality (command line based)☆68May 14, 2024Updated last year
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- Linux x86_64 Process Injection Utility☆59Mar 9, 2021Updated 5 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- A PowerShell armoury for security guys and girls☆467Jan 23, 2024Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆192Jul 4, 2024Updated last year
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,800Mar 11, 2026Updated last week
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- ☆17May 18, 2022Updated 3 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆227Jul 30, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago