☆27Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for Red-teaming
Users that are interested in Red-teaming are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jun 28, 2023Updated 2 years ago
- ☆32Jun 1, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- 渗透测试常规操作记录☆11Dec 11, 2020Updated 5 years ago
- fofa_api+bugscan插件扫描☆15Jun 24, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Obfuscate and run .exe files in a powershell script☆18Apr 2, 2023Updated 3 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆26Dec 2, 2025Updated 4 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Go shellcode loader that combines multiple evasion techniques☆388Jun 21, 2023Updated 2 years ago
- Useful Github Dorks for BugBounty -☆69Jan 1, 2023Updated 3 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- GraphQL security workshop labs☆118Jan 31, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 9 months ago
- Practice hacking JWT tokens☆115Sep 8, 2022Updated 3 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- ☆112Jul 24, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Cobalt Strike系列☆17Apr 10, 2019Updated 7 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 4 years ago
- PHP底层内核源码分析和扩展开发☆11Oct 20, 2017Updated 8 years ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago
- ☆38Jan 7, 2025Updated last year
- Misc stuff from internet☆12Nov 5, 2025Updated 5 months ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Jun 8, 2018Updated 7 years ago
- Utilities for Pentesting with BloodHound☆23Updated this week
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- IoM defualt mal package☆10Feb 22, 2026Updated last month
- Collection of PowerShell functions a Red Teamer may use in an engagement☆548Dec 8, 2023Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago