RedTiger-Tools is a multifunction automation tool dedicated to pentesting and OSINT. The project is open source and designed to be fully configurable according to user needs. It also includes a plugin system that allows users to extend or create new features, in order to centralize multiple tools into a single unified platform.
☆398May 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for RedTiger-Tools
Users that are interested in RedTiger-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes Template/Checklist for PEN-300 OSEP☆18Nov 20, 2021Updated 4 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆22Mar 20, 2026Updated 2 months ago
- Honeypot detection toolkit☆12Feb 10, 2026Updated 3 months ago
- Generate reverse shells in command line with Go !☆21Aug 9, 2020Updated 5 years ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Rust Based PE & Shellcode Packer☆43Dec 28, 2025Updated 4 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 7 months ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 7 months ago
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Sep 3, 2020Updated 5 years ago
- Ravage Framework - Powershell weaponized for offensive security professionals.☆78Feb 27, 2026Updated 2 months ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆25Feb 25, 2022Updated 4 years ago
- An open-source .NET Ransomware☆23Aug 2, 2021Updated 4 years ago
- Free BugBounty KrazePlanetTraining☆58Dec 17, 2025Updated 5 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Nov 24, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆66Feb 14, 2026Updated 3 months ago
- PowerShell implementation for AD CS☆154Mar 2, 2026Updated 2 months ago
- 🤹 Caido AI Skills☆205Apr 17, 2026Updated last month
- A Golang implant that uses Discord as a C2 team server☆65Nov 28, 2024Updated last year
- PrivacyNet: Privacy Network☆56May 7, 2026Updated 2 weeks ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆87Feb 22, 2025Updated last year
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Dec 9, 2024Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆93Jan 14, 2026Updated 4 months ago
- Obfuscate the bytes of your payload with an association dictionary☆77Nov 7, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A small How-To on creating your own weaponized WSL file☆127Jul 23, 2025Updated 9 months ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆90Nov 25, 2025Updated 5 months ago
- Fully undetected grabber (grabs wallets, passwords, cookies, modifies discord client etc.)☆168Oct 17, 2022Updated 3 years ago
- Just A list Of Some Multilingual XSS Payloads and other weird ones i made☆126Sep 28, 2025Updated 7 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 10 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆155Nov 23, 2025Updated 5 months ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆177Jun 18, 2023Updated 2 years ago
- Tool to evade Antivirus With Different Techniques☆196Aug 16, 2023Updated 2 years ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆135Nov 11, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆438Feb 13, 2026Updated 3 months ago
- PacketSpy☆159May 31, 2024Updated last year
- 64-bit, position-independent implant template for Windows in Rust.☆181Nov 28, 2025Updated 5 months ago
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆145Sep 5, 2024Updated last year
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆217Apr 17, 2026Updated last month
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆176May 28, 2025Updated 11 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆214Sep 30, 2024Updated last year