A collection of tools adversaries commonly use in an attack.
☆14Nov 23, 2024Updated last year
Alternatives and similar repositories for adversarial-tools
Users that are interested in adversarial-tools are comparing it to the libraries listed below
Sorting:
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- ☆20May 30, 2025Updated 9 months ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- ☆23Nov 29, 2023Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Sep 6, 2021Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Research on abusing GitLab Runners☆31Jul 14, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 2 weeks ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- A simple DuckDuckGo URL scraper.☆31Feb 9, 2024Updated 2 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Jan 19, 2023Updated 3 years ago
- ☆24Jun 29, 2021Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- ☆29May 4, 2021Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- Win32 utility for auditing TCP connections☆56Aug 25, 2020Updated 5 years ago
- This Powershell script is designed to be run on a supported (by Microsoft) Windows host. It checks for the most common issues that will p…☆31Jul 16, 2021Updated 4 years ago
- ☆24Feb 2, 2026Updated last month
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Aug 6, 2020Updated 5 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- ☆29Oct 15, 2023Updated 2 years ago
- Shadowsocks-like proxy written in Go☆37Dec 18, 2019Updated 6 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 7 months ago
- ☆28Mar 29, 2022Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago