A visual methodology tracking platform tailored for offensive security assessments
☆252Feb 10, 2026Updated 2 months ago
Alternatives and similar repositories for pwnflow
Users that are interested in pwnflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 10 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Fast service fingerprinting CLI for 170+ protocols (TCP/UDP/SCTP) - built by Praetorian☆262Updated this week
- Logging tool intended for red team usage☆38Dec 5, 2025Updated 4 months ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆80Oct 27, 2025Updated 6 months ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 10 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆67Jan 10, 2025Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated last month
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆492Jan 15, 2026Updated 3 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated 2 years ago
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated 3 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,355Nov 12, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 2 months ago
- ☆32Dec 5, 2024Updated last year
- Notion C2 Profile for Mythic☆45Mar 3, 2026Updated last month
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆120Jun 10, 2025Updated 10 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆263Feb 21, 2025Updated last year
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 2 weeks ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated last year
- various methods of making API calls☆19Feb 1, 2025Updated last year
- An offensive data enrichment pipeline☆956Apr 14, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Load and execute a common object file format (COFF) in the current process☆31Mar 9, 2024Updated 2 years ago
- Python based GUI for browsing LDAP☆181Dec 7, 2025Updated 4 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 12 years ago
- Initial Access and Post-Exploitation Tool for Entra ID and M365 with a browser-based GUI☆1,278Apr 13, 2026Updated 2 weeks ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 8 months ago
- Payload Generation Workflow☆41Jul 18, 2025Updated 9 months ago
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated last month
- IPSpinner works as a local proxy that redirects requests through external services.☆115Mar 19, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Mythic Agent written in PIC C.☆204Feb 4, 2025Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- ☆65Mar 15, 2024Updated 2 years ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 10 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆364Apr 8, 2026Updated 3 weeks ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 3 months ago