izmirlikezzap / RedTiger-ToolsLinks
RedTiger-Tools is a free multi-tool with many features in the areas of Cybersecurity, Pentesting, OSINT, Network Scanning, Discord and Ethical Hacking. (For educational purposes only)
☆49Updated this week
Alternatives and similar repositories for RedTiger-Tools
Users that are interested in RedTiger-Tools are comparing it to the libraries listed below
Sorting:
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆58Updated 3 months ago
 - Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Updated last year
 - A meta-list of public references to threat actor profiles and APT group datasets.☆71Updated last month
 - VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆40Updated 4 months ago
 - A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
 - Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
 - A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Updated last year
 - A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
 - Top 400 passwords as per HaveIBeenPwned☆22Updated last year
 - 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆79Updated 6 months ago
 - The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 7 months ago
 - Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆44Updated 3 months ago
 - ☆31Updated 2 years ago
 - subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
 - A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
 - Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
 - External Playbooks for Public Access☆40Updated 9 months ago
 - ☆35Updated 7 months ago
 - Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆100Updated this week
 - Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
 - This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆15Updated 10 months ago
 - A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆48Updated 2 months ago
 - PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
 - Fast Path Traversal exploitation tool☆21Updated last year
 - ☆28Updated last year
 - A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
 - ☆78Updated last year
 - ☆55Updated 9 months ago
 - A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
 - specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆63Updated 3 months ago