A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, without accounts, without IP sheets).
☆29Feb 15, 2026Updated last week
Alternatives and similar repositories for VPN-BlackBox-Checker
Users that are interested in VPN-BlackBox-Checker are comparing it to the libraries listed below
Sorting:
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Nov 24, 2025Updated 3 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 4 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 weeks ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- WMI Explorer☆85Jan 5, 2026Updated last month
- Proof of concept for Kerberos Armoring abuse.☆80Dec 12, 2025Updated 2 months ago
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- A portable C# utility for enumerating local and remote windows sessions☆55Jan 1, 2026Updated last month
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆235Feb 20, 2026Updated last week
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆41Nov 4, 2025Updated 3 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 2 months ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆34Jan 4, 2026Updated last month
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆58Feb 21, 2026Updated last week
- Impacket☆49Updated this week
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆208Nov 18, 2025Updated 3 months ago
- Threat Hunting queries of multiple platforms☆61Feb 19, 2026Updated last week
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Jan 5, 2023Updated 3 years ago
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 4 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆65Nov 14, 2025Updated 3 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆342Dec 5, 2025Updated 2 months ago
- metasploit module for the CVE-2025-24071☆26Mar 18, 2025Updated 11 months ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆54Feb 15, 2026Updated last week
- ☆108Feb 14, 2026Updated 2 weeks ago
- 对IP检测是否cve漏洞,是否为蜜罐☆29Oct 27, 2024Updated last year
- A high-performance Monero (XMR) mining implementation in C++ using the RandomX algorithm. This miner is optimized for modern CPUs and pro…☆52Feb 2, 2026Updated 3 weeks ago
- ☆42Updated this week
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- Android deeplink misconfiguration detector and exploitation tool☆63Updated this week
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- A list of all Active Directory machines from HackTheBox☆215Jan 25, 2026Updated last month
- Exhaustive search and flexible filtering of Active Directory ACEs.☆74Nov 10, 2025Updated 3 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆77Feb 5, 2026Updated 3 weeks ago