A safe, optimized, and high-performance version of RedTiger-Tools, fully legal and designed exclusively for educational purposes.
☆254Dec 27, 2025Updated 4 months ago
Alternatives and similar repositories for RedTiger-Tools
Users that are interested in RedTiger-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆21Mar 20, 2026Updated last month
- Honeypot detection toolkit☆12Feb 10, 2026Updated 2 months ago
- Rust Based PE & Shellcode Packer☆42Dec 28, 2025Updated 4 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Ravage Framework - Powershell weaponized for offensive security professionals.☆78Feb 27, 2026Updated 2 months ago
- ☆44Jul 17, 2025Updated 9 months ago
- Free BugBounty KrazePlanetTraining☆58Dec 17, 2025Updated 4 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 10 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Nov 24, 2025Updated 5 months ago
- A Simple AES Command Line Crypter☆40Jan 19, 2023Updated 3 years ago
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆66Feb 14, 2026Updated 2 months ago
- 🤹 Caido AI Skills☆189Apr 17, 2026Updated 2 weeks ago
- This project allows to launch your Telegram bot in a few minutes to communicate with free or paid AI models via OpenRouter.☆84Aug 21, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆83Mar 24, 2026Updated last month
- PrivacyNet: Privacy Network☆54Sep 12, 2024Updated last year
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Dec 9, 2024Updated last year
- AutoAR is an automated security reconnaissance tool, ASM and Discord bot for bug bounty hunters and penetration testers. It automates gat…☆188Updated this week
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- Obfuscate the bytes of your payload with an association dictionary☆76Nov 7, 2025Updated 5 months ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆87Nov 25, 2025Updated 5 months ago
- Just A list Of Some Multilingual XSS Payloads and other weird ones i made☆125Sep 28, 2025Updated 7 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆156Nov 23, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆88Jun 29, 2023Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆121Jul 31, 2024Updated last year
- ☆98Apr 15, 2022Updated 4 years ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆132Nov 11, 2024Updated last year
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 9 months ago
- 64-bit, position-independent implant template for Windows in Rust.☆182Nov 28, 2025Updated 5 months ago
- Piper Burp Suite Extender plugin☆130Jan 14, 2026Updated 3 months ago
- Sleep Obfuscation in Rust☆281Dec 1, 2025Updated 5 months ago
- 🕵️ OSINT Tool (github tracker)☆169May 31, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆211Sep 30, 2024Updated last year
- Enumerate Domain Users Without Authentication☆284Apr 22, 2025Updated last year
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆453Nov 3, 2025Updated 5 months ago
- grim reaper c2☆348Nov 19, 2022Updated 3 years ago
- Subdomain Enumerator and Simple Crawler☆361Feb 12, 2026Updated 2 months ago
- 🕵️ Email osint tool☆528Jun 25, 2024Updated last year
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆445Jan 29, 2026Updated 3 months ago