☆27Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for Red-teaming
Users that are interested in Red-teaming are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jun 28, 2023Updated 2 years ago
- ☆32Jun 1, 2024Updated last year
- zhttp是一个对net/http标准库的封装,参考了python中著名的requests库☆14Apr 19, 2024Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆25Nov 28, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Obfuscate and run .exe files in a powershell script☆18Apr 2, 2023Updated 3 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆26Dec 2, 2025Updated 5 months ago
- Python Automation☆13May 19, 2021Updated 5 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆14Jan 9, 2024Updated 2 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Go shellcode loader that combines multiple evasion techniques☆388Jun 21, 2023Updated 2 years ago
- golang网站后台扫描器☆15Jun 25, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Useful Github Dorks for BugBounty -☆70Jan 1, 2023Updated 3 years ago
- GraphQL security workshop labs☆119Jan 31, 2026Updated 3 months ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 6 years ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 10 months ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated 2 years ago
- ☆112Jul 24, 2023Updated 2 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Cobalt Strike系列☆17Apr 10, 2019Updated 7 years ago
- PHP底层内核源码分析和扩展开发☆11Oct 20, 2017Updated 8 years ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 8 months ago
- ☆38Jan 7, 2025Updated last year
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- Utilities for Pentesting with BloodHound☆23Updated this week
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Jun 8, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆30Jun 19, 2023Updated 2 years ago
- 收集规则☆30Dec 8, 2022Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago