CLI component of OWASP PurpleTeam
☆136Dec 13, 2023Updated 2 years ago
Alternatives and similar repositories for purpleteam
Users that are interested in purpleteam are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Application scanning component of OWASP PurpleTeam☆15Feb 12, 2023Updated 3 years ago
- Collection of dynamic security related helpers☆16Dec 9, 2022Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 11 months ago
- Client-side scripts provided by WhoisXML API, Inc., for clients using WHOIS data feeds to obtain bulk whois data or to set up a WHOIS da…☆19Jun 7, 2023Updated 2 years ago
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- delosNmap | Nmap Script☆39Jan 15, 2023Updated 3 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- ☆15Jan 27, 2022Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆47Oct 3, 2021Updated 4 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Sep 15, 2022Updated 3 years ago
- Remote command shell application written in C# targeting the .NET runtime.☆29Mar 8, 2026Updated last month
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- WhiteBeam: Transparent endpoint security☆101Mar 29, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A powerful reverse shell generator☆46Mar 18, 2026Updated last month
- A wacky exploitation framework written in pure python3.☆22Mar 24, 2024Updated 2 years ago
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Jun 13, 2022Updated 3 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆16Apr 8, 2026Updated last week
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- ☆13Dec 15, 2024Updated last year
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- spring4shell | CVE-2022-22965☆23Jun 30, 2022Updated 3 years ago
- some config files☆14Feb 23, 2026Updated last month