A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.
☆55Mar 15, 2026Updated this week
Alternatives and similar repositories for trajan
Users that are interested in trajan are comparing it to the libraries listed below
Sorting:
- Notion C2 Profile for Mythic☆35Mar 3, 2026Updated 2 weeks ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆88Feb 9, 2026Updated last month
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 5 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- ☆17Jan 9, 2025Updated last year
- Awesome MalDev Links☆46Mar 2, 2026Updated 2 weeks ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆68Mar 10, 2026Updated last week
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 5 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra al…☆154Updated this week
- ☆28Feb 11, 2026Updated last month
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆65Feb 5, 2026Updated last month
- MDE/MDI Defender setup for Ludus☆49Mar 5, 2026Updated last week
- ☆19Aug 26, 2020Updated 5 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- An Ansible role that runs Vulhub environments on a Linux system.☆21Oct 15, 2025Updated 5 months ago
- Claude MCP server to perform analysis on ROADrecon data☆49Mar 30, 2025Updated 11 months ago
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated 3 weeks ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆42Nov 22, 2025Updated 3 months ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆41Feb 6, 2026Updated last month
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆52Nov 3, 2025Updated 4 months ago
- A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+S…☆116Dec 21, 2025Updated 2 months ago
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆75Feb 25, 2026Updated 3 weeks ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 3 months ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- ☆51Nov 26, 2025Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 11 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆147Dec 6, 2025Updated 3 months ago
- Fast service fingerprinting CLI for 120+ protocols (TCP/UDP/SCTP) - built by Praetorian☆208Updated this week
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Dec 19, 2025Updated 2 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆93Feb 22, 2026Updated 3 weeks ago