This is a repository for Penetration Test, Purple Team Exercise and Red Team
☆17Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for turme
Users that are interested in turme are comparing it to the libraries listed below
Sorting:
- Active Directory Penetration Testing for Red Teams☆58Oct 5, 2024Updated last year
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Aug 17, 2022Updated 3 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 7 months ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- This script is written in Solidity and Python3, it allows you to sell Honeypot tokens despite broken TransferFrom function.☆12Jan 28, 2022Updated 4 years ago
- Real Android malware apps discussed in the book☆46Oct 12, 2023Updated 2 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated 2 months ago
- ☆13Dec 12, 2022Updated 3 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- WireGuard client for PacketFence ZTNA☆11Apr 26, 2021Updated 4 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- ☆12Apr 20, 2025Updated 10 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- ☆10Aug 9, 2024Updated last year
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- ☆10Jan 8, 2023Updated 3 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- find an unconfirmed transaction you like and fire up my app. Input your Wallet address when prompted to and warch the tx be rerouted to y…☆12May 8, 2020Updated 5 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Feb 12, 2024Updated 2 years ago
- A Credit Card Payment System - CCPS build with react, typescript, bootstrap, sass, react-transition, font-awesome☆11Mar 25, 2022Updated 3 years ago
- Bitcoin address changer. It changes the clipboard depending of the pubkey.☆10Sep 12, 2021Updated 4 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆48Aug 11, 2022Updated 3 years ago
- ☆19Jul 23, 2025Updated 7 months ago
- ☆13May 18, 2022Updated 3 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆43Updated this week