byt3n33dl3 / RoninView external linksLinks
π± Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.
β14Sep 8, 2024Updated last year
Alternatives and similar repositories for Ronin
Users that are interested in Ronin are comparing it to the libraries listed below
Sorting:
- Automated exploit scanners for public CCTV's services and other polaroid public stuff.β23Sep 29, 2024Updated last year
- Custom BloodHound graph, connecting relationships for Attack-paths.β55Feb 15, 2025Updated last year
- Active Directory kerberos attack framworks.β43Sep 11, 2024Updated last year
- Github Profile Readme (https://byt3n33dl3.substack.com/)β36Nov 12, 2025Updated 3 months ago
- Six Degrees of Enterprise Domain Adminβ28Jun 5, 2025Updated 8 months ago
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.β16Sep 11, 2024Updated last year
- World's most advanced Mach-O and TCC binary malware for macOS or Unix-based distro.β44Sep 15, 2024Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.β44Jan 4, 2025Updated last year
- The Network Relay Execution Tool.β17Sep 23, 2024Updated last year
- MFA and 2FA chainers, authentication PenTesting frameworks.β19Jul 9, 2024Updated last year
- Seven Degrees of Domain Adminβ85Oct 28, 2024Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.β53Oct 27, 2024Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many oβ¦β49Jul 14, 2024Updated last year
- Internal data collector for BloodHound and BlackMarlinExec pathway strategies, and attack surface elimination.β107Apr 17, 2025Updated 9 months ago
- Offshore for LLMNR/NBT-NS Poisoning and abuse for PrivEsc.β27Jul 7, 2024Updated last year
- Support CobaltStrike kit for File System (NTFS/NPFS) Minifilter Drivers error handling.β17Jul 19, 2024Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.β17Jun 25, 2024Updated last year
- YARA for offensive, YARA can do that!?β11Jul 9, 2024Updated last year
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.β13Sep 11, 2024Updated last year
- C2 Application based GUI with the agent generator.β13May 12, 2025Updated 9 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucβ¦β10Jun 10, 2024Updated last year
- NOC is an Integration Bypasser, Change PoC Binary to quirks of working with the LLVM.β11Jul 22, 2024Updated last year
- WiFi Pentesting on Mac filters bypass and SSID manipulation.β21Jul 8, 2024Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.β26Nov 22, 2024Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.β10Jul 18, 2024Updated last year
- Playing with WPA frequency sessions framworks, check-lists of customs firmware and intensity of RF.β13Jul 7, 2024Updated last year
- CLI application for credentials recovery, converting and multi-threaded cracking mechanism for online and offline scenario.β88Nov 22, 2024Updated last year
- Encrypting directory and access. Execute the commands based on external inputs RCE, single-C2 and key-logging.β11Jul 9, 2024Updated last year
- Backdoor for Rubella on Shell'sβ32May 4, 2024Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.β30Jun 30, 2024Updated last year
- Android attack for root-ed Android kit, including ASLR and SSL-pinning test mechanism.β39Jul 25, 2024Updated last year
- Defense evasion collections and pentesting frameworks for assessment, following Greenbone and openVAS.β124Jul 9, 2024Updated last year
- Adversarial frameworks for Android and iOS sandbox evasion.β262Sep 28, 2024Updated last year
- π BotNet ( .NET ) Source Codesβ14May 2, 2024Updated last year
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.β13May 21, 2024Updated last year
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).β12Jul 6, 2024Updated last year
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?β13Jun 24, 2024Updated last year
- Latest WannaCry ransomware version (2.0) for adversary emulation assessment, encripting Program Files (x86), Program Files (x64), Programβ¦β68May 15, 2024Updated last year
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.β17Jul 17, 2024Updated last year