Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scenarios.
☆226Sep 4, 2024Updated last year
Alternatives and similar repositories for certainly
Users that are interested in certainly are comparing it to the libraries listed below
Sorting:
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Jul 31, 2024Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆191Sep 8, 2024Updated last year
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,033Dec 31, 2025Updated 2 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆598Updated this week
- Unleash the power of cloud☆818Nov 19, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆14Mar 19, 2024Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆323Oct 12, 2025Updated 4 months ago
- ☆73Nov 22, 2021Updated 4 years ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆132Jan 28, 2025Updated last year
- Bitor Scanning Software☆454Nov 7, 2025Updated 3 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆228Mar 28, 2025Updated 11 months ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆463Mar 28, 2024Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 2 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆237Aug 25, 2024Updated last year
- ☆176Apr 9, 2025Updated 10 months ago
- Azure JWT Token Manipulation Toolset☆716Dec 6, 2024Updated last year
- ☆14Mar 8, 2023Updated 2 years ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 10 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆607Dec 9, 2025Updated 2 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,530Feb 5, 2026Updated last month
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆382Jan 23, 2025Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- User Enumeration of Microsoft Teams users via API☆185Mar 27, 2024Updated last year
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆394Feb 9, 2026Updated 3 weeks ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Mar 18, 2024Updated last year