All Projects → A Red Teamer Diaries → Similar Projects or Alternatives

2789 Open source projects that are alternatives of or similar to A Red Teamer Diaries

Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-67.02%)
Mutual labels:  hacking, exploit, metasploit
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-58.38%)
Mutual labels:  cybersecurity, redteam, tools
Powershell Red Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (-59.42%)
Mutual labels:  cybersecurity, redteam, enumeration
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-81.15%)
Mutual labels:  exploit, vulnerability, redteam
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (-66.75%)
Mutual labels:  cybersecurity, redteam, tools
Cloudbrute
Awesome cloud enumerator
Stars: ✭ 268 (-29.84%)
Mutual labels:  hacking, pentesting, redteam
Msploitego
Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-67.54%)
Mutual labels:  penetration-testing, nmap, metasploit
Gorsair
Gorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+77.49%)
Mutual labels:  pentesting, penetration-testing, nmap
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-62.83%)
Gitjacker
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+226.96%)
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-68.32%)
Mutual labels:  hacking, pentesting, cybersecurity
Learn Web Hacking
Study Notes For Web Hacking / Web安全学习笔记
Stars: ✭ 2,326 (+508.9%)
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-63.35%)
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (-62.57%)
Mutual labels:  hacking, exploit, tools
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (+235.34%)
Mutual labels:  pentesting, exploit, vulnerability
Rsf
The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Stars: ✭ 76 (-80.1%)
Reconness
ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-65.71%)
Mutual labels:  pentesting, redteam, tools
Wadcoms.github.io
WADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+12.83%)
Autosploit
Automated Mass Exploiter
Stars: ✭ 4,500 (+1078.01%)
Mutual labels:  security-tools, exploit, metasploit
Fireelf
fireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+13.87%)
Mutual labels:  security-tools, pentesting, redteam
Hashview
A web front-end for password cracking and analytics
Stars: ✭ 601 (+57.33%)
0xsp Mongoose
a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (+9.69%)
Pentesting Cookbook
A set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-78.53%)
Mutual labels:  security-tools, pentesting, redteam
Vulmap
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+182.46%)
Mutual labels:  security-tools, pentesting, exploit
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (-20.94%)
Otseca
Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (+8.9%)
PwnX.py
🏴‍☠️ Pwn misconfigured sites running ShareX custom image uploader API through chained exploit
Stars: ✭ 30 (-92.15%)
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-65.97%)
Rescope
Rescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (-59.16%)
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-50%)
Mutual labels:  security-tools, cybersecurity, redteam
Knary
A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (-51.05%)
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+1701.57%)
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (-92.41%)
Mutual labels:  cybersecurity, enumeration, nmap
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+8.12%)
Mutual labels:  hacking, vulnerability, tools
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+8.12%)
Mutual labels:  hacking, security-tools, nmap
Phishapi
Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-28.8%)
Mutual labels:  hacking, pentesting, cybersecurity
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-57.33%)
Mutual labels:  hacking, enumeration, nmap
Remote Desktop Caching
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-55.24%)
Mutual labels:  hacking, penetration-testing, redteam
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-57.59%)
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+505.24%)
Mutual labels:  hacking, pentesting, enumeration
Nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+1455.76%)
Mutual labels:  hacking, penetration-testing, redteam
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-51.31%)
Mutual labels:  hacking, exploit, metasploit
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+787.7%)
Jalesc
Just Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-60.21%)
Mutual labels:  hacking, pentesting, enumeration
Crips
IP Tools To quickly get information about IP Address's, Web Pages and DNS records.
Stars: ✭ 272 (-28.8%)
Mutual labels:  hacking, pentesting, nmap
Traitor
⬆️ ☠️ Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, polkit, docker socket
Stars: ✭ 3,473 (+809.16%)
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-50.26%)
Zbn
安全编排与自动化响应平台
Stars: ✭ 201 (-47.38%)
Mutual labels:  hacking, security-tools, tools
Evil Ssdp
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Stars: ✭ 204 (-46.6%)
Gray hat csharp code
This repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (-21.2%)
Mutual labels:  pentesting, redteam, metasploit
Ctf Notes
Everything needed for doing CTFs
Stars: ✭ 304 (-20.42%)
Scripts
Scripts I use during pentest engagements.
Stars: ✭ 834 (+118.32%)
Mutual labels:  hacking, penetration-testing, tools
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-78.53%)
Mutual labels:  hacking, penetration-testing, exploit
Phpvuln
Audit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-61.78%)
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (-43.98%)
Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (-36.65%)
Mutual labels:  hacking, penetration-testing, exploit
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-76.7%)
Mutual labels:  exploit, cybersecurity, enumeration
CnC-detection
Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Stars: ✭ 15 (-96.07%)
Mutual labels:  meterpreter, metasploit
Drupalgeddon3
Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-95.29%)
Mutual labels:  exploit, metasploit
Brahma
Brahma - Privilege elevation exploit for Nintendo 3DS
Stars: ✭ 34 (-91.1%)
Mutual labels:  exploit, privilege-escalation
121-180 of 2789 similar projects