The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written in multiple (non-English) languages, common problem occurring from scraped employee name lists (e.g. from Linkedin). 2. to transliterate a wordlist that may include words/phrases written in multiple (non-Englis
☆138Jul 19, 2024Updated last year
Alternatives and similar repositories for BabelStrike
Users that are interested in BabelStrike are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆26Jun 24, 2025Updated 9 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Jul 19, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆84Jul 19, 2024Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,416Jun 8, 2025Updated 9 months ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆408Jan 19, 2025Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Jul 19, 2024Updated last year
- ☆48Jul 19, 2024Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,419Jan 19, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆53Jul 17, 2025Updated 8 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- All-sources tool to search websites by favicons☆188Nov 9, 2024Updated last year
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆55Oct 19, 2023Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,153Jul 19, 2024Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆549Jul 16, 2021Updated 4 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- ☆569Mar 28, 2024Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆123Jan 15, 2025Updated last year
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i …☆397Aug 2, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Updated this week
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated 2 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 3 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago