infobyte / faraday_agent_dispatcherView external linksLinks
Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.
☆47Jan 26, 2026Updated 2 weeks ago
Alternatives and similar repositories for faraday_agent_dispatcher
Users that are interested in faraday_agent_dispatcher are comparing it to the libraries listed below
Sorting:
- Faraday's Command Line Interface☆51Jan 26, 2026Updated 2 weeks ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Simple Chatbot for testing AI Red Team tooling☆16Feb 11, 2025Updated last year
- DPE - Default Password Enumeration☆36Jun 3, 2013Updated 12 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆32Apr 28, 2025Updated 9 months ago
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 6 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 6 months ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 2 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Gather domains as a precursor to scanning☆20Jan 20, 2026Updated 3 weeks ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- Splice VPN access into your default network space☆16Jul 31, 2018Updated 7 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- WASM wrapper over the crypto library☆21Dec 18, 2025Updated last month
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- ☆21Jan 29, 2026Updated 2 weeks ago
- ☆22Feb 2, 2026Updated last week
- Research on abusing GitLab Runners☆30Jul 14, 2020Updated 5 years ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated last month
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆28Apr 4, 2025Updated 10 months ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago