☆2,380Oct 6, 2023Updated 2 years ago
Alternatives and similar repositories for Pentest-Tools
Users that are interested in Pentest-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automation for internal Windows Penetrationtest / AD-Security☆3,653Aug 28, 2025Updated 7 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,576Jan 18, 2026Updated 3 months ago
- ☆1,677Apr 14, 2025Updated last year
- Red Teaming Tactics and Techniques☆4,568Aug 22, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,237Sep 29, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tools & Interesting Things for RedTeam Ops☆2,267Feb 10, 2026Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,729Jul 6, 2025Updated 9 months ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,145Nov 28, 2024Updated last year
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,850Updated this week
- Some usefull Scripts and Executables for Pentest & Forensics☆1,153Dec 11, 2025Updated 4 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Apr 6, 2026Updated last week
- Red Teaming & Pentesting checklists for various engagements☆2,655Jul 27, 2025Updated 8 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,930Jun 27, 2023Updated 2 years ago
- Extract credentials from lsass remotely☆2,192Mar 23, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Azure Security Resources and Notes☆1,734Feb 17, 2026Updated 2 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,664Jul 18, 2024Updated last year
- Trying to tame the three-headed dog.☆4,960Nov 14, 2025Updated 5 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,878Aug 18, 2023Updated 2 years ago
- Privilege Escalation Enumeration Script for Windows☆3,806Apr 10, 2026Updated last week
- A swiss army knife for pentesting networks☆9,124Dec 6, 2023Updated 2 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,814Jul 29, 2025Updated 8 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,541Jan 10, 2025Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,219Aug 7, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆669Nov 17, 2021Updated 4 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,851Apr 25, 2024Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,116Apr 5, 2026Updated last week
- List of Awesome Red Teaming Resources☆7,883Dec 28, 2023Updated 2 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,713Nov 29, 2024Updated last year
- ☆538Nov 20, 2021Updated 4 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,275Apr 12, 2024Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,905Oct 29, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,221Jan 5, 2026Updated 3 months ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,865Aug 12, 2021Updated 4 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,166Mar 8, 2026Updated last month
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,780Feb 27, 2026Updated last month
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆881Mar 29, 2021Updated 5 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,299Aug 15, 2024Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,444Apr 10, 2026Updated last week