Red Team tools containerized
☆76Mar 25, 2026Updated 2 weeks ago
Alternatives and similar repositories for Containers
Users that are interested in Containers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆164Feb 2, 2026Updated 2 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 2 months ago
- Let's make quick work of GraphQL instances ;)☆25Mar 8, 2026Updated last month
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated last month
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆84Feb 27, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 5 months ago
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆152Jan 25, 2026Updated 2 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆161Jan 3, 2026Updated 3 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 3 months ago
- A low-entropy shellcode executor that encodes shellcode bytes into common English words, with anti-debugging capabilities.☆22Aug 10, 2025Updated 8 months ago
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆42Mar 16, 2026Updated 3 weeks ago
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is…☆27May 18, 2025Updated 10 months ago
- ☆73Jan 1, 2026Updated 3 months ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated 2 months ago
- Obex – Blocking unwanted DLLs in user mode☆283Sep 18, 2025Updated 6 months ago
- Dark Light Viewer - a tool to conduct change detection over time using VIIRS night lights data.☆42Mar 3, 2026Updated last month
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- WMI Explorer☆98Jan 5, 2026Updated 3 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 10 months ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Language server for the Ameba linter☆38Updated this week
- Small fuzzing library with an example script using it.☆21Feb 12, 2021Updated 5 years ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 3 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆83Sep 11, 2025Updated 7 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 4 months ago
- ☆13Mar 6, 2025Updated last year
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- HTTP Headers Security Cheat Sheet☆13Sep 25, 2021Updated 4 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Feb 13, 2021Updated 5 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- genAI agent providing security context, tooling for performing security analysis on CVE, components and more☆22Apr 4, 2026Updated last week
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- ☆20Sep 8, 2019Updated 6 years ago