mturhanlar / turmeView external linksLinks
This is a repository for Penetration Test, Purple Team Exercise and Red Team
☆17Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for turme
Users that are interested in turme are comparing it to the libraries listed below
Sorting:
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- Active Directory Penetration Testing for Red Teams☆58Oct 5, 2024Updated last year
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Aug 17, 2022Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 3 years ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Dec 11, 2023Updated 2 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27May 23, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Aug 9, 2023Updated 2 years ago
- This script is written in Solidity and Python3, it allows you to sell Honeypot tokens despite broken TransferFrom function.☆12Jan 28, 2022Updated 4 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 2 years ago
- Real Android malware apps discussed in the book☆45Oct 12, 2023Updated 2 years ago
- A negative testing framework, DoLTEst, for finding non-standard-compliant bugs in LTE protocol implementations of UEs☆40Aug 8, 2022Updated 3 years ago
- ☆49Feb 11, 2023Updated 3 years ago
- find an unconfirmed transaction you like and fire up my app. Input your Wallet address when prompted to and warch the tx be rerouted to y…☆12May 8, 2020Updated 5 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated last month
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆16Jul 28, 2025Updated 6 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago