Bitor Scanning Software
☆456Nov 7, 2025Updated 4 months ago
Alternatives and similar repositories for Bitor
Users that are interested in Bitor are comparing it to the libraries listed below
Sorting:
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆900Mar 12, 2026Updated last week
- Threat-hunting tool for Linux☆1,047Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated this week
- Red Teaming for AI and Cloud☆208Mar 13, 2026Updated last week
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,392Updated this week
- Open Adversarial Exposure Validation Platform☆1,645Updated this week
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆730Feb 14, 2026Updated last month
- bowing to the AI Overlords.☆31Dec 18, 2024Updated last year
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- ☆774May 7, 2025Updated 10 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Jan 30, 2026Updated last month
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆487Sep 24, 2025Updated 5 months ago
- secator - the pentester's swiss knife☆1,249Updated this week
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆385Jan 23, 2025Updated last year
- macOS dylib stager☆36Jan 22, 2025Updated last year
- An offensive data enrichment pipeline☆943Mar 10, 2026Updated last week
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆610Updated this week
- ☆49Apr 9, 2025Updated 11 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆105Feb 6, 2025Updated last year
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,216Mar 11, 2026Updated last week
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,261Jul 22, 2025Updated 8 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆68Mar 17, 2025Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year
- Parses Snaffler output file and generate beautified outputs.☆137Jan 4, 2026Updated 2 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆633Jan 15, 2026Updated 2 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆364Sep 3, 2025Updated 6 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,122Feb 27, 2026Updated 3 weeks ago
- Prevent merging of malicious code in pull requests☆253Jan 8, 2026Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆46Feb 27, 2024Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated 3 weeks ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆322Oct 12, 2025Updated 5 months ago