runZeroInc / runzero-toolsLinks
Open source tools, libraries, and datasets related to the runZero product and associated research
☆124Updated 4 months ago
Alternatives and similar repositories for runzero-tools
Users that are interested in runzero-tools are comparing it to the libraries listed below
Sorting:
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 7 months ago
- Test a host for susceptibility to CVE-2019-19781☆109Updated 5 years ago
- ATT&CK Evaluations website (DEPRECATED)☆62Updated 4 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- A Django application to help red team operators manage a library of domain names☆167Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- A CLI tool for querying passive DNS services☆42Updated last year
- POC for utilizing wikipedia API for Command and Control☆29Updated 3 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 6 years ago
- Open source Active Directory security audit framework.☆136Updated 7 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Updated 6 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- Burp Extension for AWS Signing☆90Updated 11 months ago
- Burp Suite extension to perform Kerberos authentication☆105Updated last year
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Updated 2 years ago
- ☆33Updated 7 years ago
- ☆82Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- Post exploitation tool for configuration management servers.☆77Updated 2 years ago
- ☆73Updated last year
- Identify IP addresses owned by public cloud providers☆127Updated last year
- Atomic Red Team App for Phantom☆16Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago