Automated pentest report writing and generation using DOCX templates and markdown.
☆26Apr 1, 2025Updated last year
Alternatives and similar repositories for atri
Users that are interested in atri are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated 2 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆40Jul 28, 2025Updated 9 months ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- ☆11Oct 11, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Active Directory share enumeration tool☆12Apr 28, 2025Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆78Jul 29, 2025Updated 9 months ago
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated 2 years ago
- Solve problems of device identity, certificates and the keychain.☆13Jan 3, 2019Updated 7 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆43Apr 13, 2026Updated last month
- A lightweight caching proxy for package registries.☆69May 15, 2026Updated last week
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 7 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆28Jun 26, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A simple web app to get the latest EPSS data for a CVE ID☆13Dec 14, 2025Updated 5 months ago
- A proxy to fan out a single request to multiple prometheus servers and merge the responses☆12Feb 22, 2019Updated 7 years ago
- Frontend at: https://github.com/souravrax/codeditor-front☆10Jun 15, 2025Updated 11 months ago
- A PHP web interface for monitoring system resources on Linux servers.☆10Jun 30, 2016Updated 9 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆15May 12, 2025Updated last year
- Go code generators for the Apple Device Management schema data☆11Jul 14, 2023Updated 2 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆23Apr 30, 2024Updated 2 years ago
- Fork of Dave Dribin's original MAME OS X☆31Apr 17, 2013Updated 13 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 11 months ago
- Service to monitor one or more vmx path[s] and restart the vmx[s] if necessary☆11Mar 2, 2022Updated 4 years ago
- Anyone can contribute in any domain! An open-source repository to contribute Learning Resources. Contribute to this repository as a part …☆10Dec 7, 2020Updated 5 years ago
- Detect common classes of XPC exploits☆16Mar 19, 2026Updated 2 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆50Apr 7, 2025Updated last year
- Use Munki to enable Touch ID for sudo☆12Jun 14, 2020Updated 5 years ago
- ☆10May 12, 2017Updated 9 years ago
- Analyze apache log and display histograms and stats about the requests, in order to identify main problematic urls☆17Nov 10, 2025Updated 6 months ago
- JPass is a CLI tool written in Swift that makes managing Jamf Pro's LAPS fast, secure, and scriptable. Effortlessly retrieve, set, or rot…☆13Feb 18, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆14Aug 8, 2022Updated 3 years ago
- Developing 30 things with JavaScript each one day for next 30 days.☆10Nov 27, 2020Updated 5 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Aug 1, 2019Updated 6 years ago
- Material for the 2024 MacAdmins Conference GitOps workshop☆14Sep 2, 2024Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Mar 7, 2024Updated 2 years ago
- A restaurant web app for campuses with e-Wallet☆11Mar 31, 2017Updated 9 years ago
- WiFi HID Injector for Fun & Profit☆18May 2, 2017Updated 9 years ago