☆15Oct 24, 2018Updated 7 years ago
Alternatives and similar repositories for redtest
Users that are interested in redtest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The action integrates Electronegativity, a tool to identify misconfigurations and security anti-patterns in Electron applications, into G…☆15Apr 15, 2023Updated 2 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- ☆37Aug 18, 2019Updated 6 years ago
- ☆12Mar 23, 2019Updated 7 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- An LDAP based Active Directory user and group enumeration tool☆309Feb 11, 2026Updated last month
- BSidesPDX CTF 2017☆11Dec 7, 2017Updated 8 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- Some useful libraries converted to WatcomC++.☆19Mar 11, 2026Updated last week
- An enchanting 🔮 web screenshot tool for capturing and sharing web content effortlessly☆34Nov 15, 2025Updated 4 months ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- hMailServer Password Decrypter☆12Nov 14, 2016Updated 9 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- OpenGL Software Rasterizer.☆26Feb 10, 2026Updated last month
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆33Feb 5, 2019Updated 7 years ago
- Rapid7 Metasploit API client library written in Ruby☆24Feb 13, 2025Updated last year
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Front end (UI) plugin to support security-analytics☆16Mar 13, 2026Updated last week
- A Magento package containing a quick-and-dirty PHP shell.☆20Nov 12, 2014Updated 11 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Yet another obfuscated payload generator written in Rust!☆13Feb 9, 2023Updated 3 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A multithreaded Python3 program that fuzzes HTTP headers and values and outputs the results to a CSV file.☆21Jan 13, 2019Updated 7 years ago
- Arduino keyboard languages for easy swapping of keyboard layout codes to match your language, ideal for non US users☆10Apr 5, 2024Updated last year
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Feb 16, 2019Updated 7 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- ☆15Nov 10, 2014Updated 11 years ago
- Wiki for Pentesting iOS apps☆26Jul 23, 2025Updated 8 months ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- ☆526Sep 15, 2022Updated 3 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- A Broken-URL Checker☆82Nov 2, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago