scripts to setup environments for red/blue teams.
☆16Nov 30, 2023Updated 2 years ago
Alternatives and similar repositories for purple
Users that are interested in purple are comparing it to the libraries listed below
Sorting:
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Capture The Flag Information☆12Dec 7, 2018Updated 7 years ago
- Template para proyectos de Pentesting y registrar el contenido en un Vault de Obsidian☆14Aug 5, 2021Updated 4 years ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆25Jun 26, 2025Updated 8 months ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 8 months ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Jun 6, 2024Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Jun 3, 2023Updated 2 years ago
- ☆10Updated this week
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- ☆77Updated this week
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆52Aug 28, 2025Updated 6 months ago
- CVE-2020-1938漏洞复现☆38Feb 21, 2020Updated 6 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- The best companion for every Amritian☆10Mar 4, 2022Updated 4 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Lightweight, Portable, Phishing and Email Campaign Utility☆13Oct 15, 2018Updated 7 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆55Jul 13, 2025Updated 7 months ago