Create randomly insecure VMs
☆2,757Apr 16, 2026Updated this week
Alternatives and similar repositories for SecGen
Users that are interested in SecGen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆316Apr 18, 2019Updated 7 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,471Oct 1, 2025Updated 6 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,946Jul 6, 2024Updated last year
- SimplE RePort wrIting and COllaboration tool☆1,113May 3, 2020Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆78Oct 15, 2019Updated 6 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,905Jan 24, 2024Updated 2 years ago
- CTF framework and exploit development library☆13,360Apr 7, 2026Updated last week
- Six Degrees of Domain Admin☆10,537Mar 2, 2026Updated last month
- Empire is a PowerShell and Python post-exploitation agent.☆7,837Jan 19, 2020Updated 6 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,501Sep 22, 2024Updated last year
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,193Oct 24, 2018Updated 7 years ago
- Python-based tool to dump security information from Windows systems☆282Jun 22, 2020Updated 5 years ago
- A swiss army knife for pentesting networks☆9,124Dec 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,868Apr 25, 2024Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,814Jul 29, 2025Updated 8 months ago
- A Tool for Domain Flyovers☆5,923May 22, 2022Updated 3 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,505Mar 22, 2026Updated 3 weeks ago
- ☆2,322Dec 8, 2023Updated 2 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,451Jul 22, 2024Updated last year
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,516Feb 13, 2025Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,189Dec 11, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,948Aug 17, 2020Updated 5 years ago
- A database of common, interesting or useful commands, in one handy referable form☆754Jan 30, 2024Updated 2 years ago
- List of Awesome Red Teaming Resources☆7,883Dec 28, 2023Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,271Nov 20, 2025Updated 5 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,986May 1, 2025Updated 11 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,615Dec 10, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,793Apr 6, 2026Updated 2 weeks ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Automated Adversary Emulation Platform☆6,900Updated this week
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,115Apr 26, 2020Updated 5 years ago
- Some setup scripts for security research tools.☆9,362Mar 1, 2026Updated last month
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,243Oct 4, 2023Updated 2 years ago