All Projects → Red-Team-Essentials → Similar Projects or Alternatives

741 Open source projects that are alternatives of or similar to Red-Team-Essentials

Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+668.18%)
Mutual labels:  cybersecurity
Recommendations for engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 39 (+77.27%)
Mutual labels:  cybersecurity
attack to veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+154.55%)
Mutual labels:  cybersecurity
Checkmyhttps
We propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (+59.09%)
Mutual labels:  cybersecurity
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (+1072.73%)
Mutual labels:  cybersecurity
Passhunt
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+4268.18%)
Mutual labels:  cybersecurity
MOSP
A collaborative platform for creating, editing and sharing JSON objects.
Stars: ✭ 72 (+227.27%)
Mutual labels:  cybersecurity
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-4.55%)
Mutual labels:  cybersecurity
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+1209.09%)
Mutual labels:  cybersecurity
Walkoff
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Stars: ✭ 855 (+3786.36%)
Mutual labels:  cybersecurity
urlRecon
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+40.91%)
Mutual labels:  cybersecurity
Csp
The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
Stars: ✭ 23 (+4.55%)
Mutual labels:  cybersecurity
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (+831.82%)
Mutual labels:  pentesting
Riceteacatpanda
repo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-18.18%)
Mutual labels:  cybersecurity
awesome-executable-packing
A curated list of awesome resources related to executable packing
Stars: ✭ 720 (+3172.73%)
Mutual labels:  cybersecurity
Vuldash
Vulnerability Dashboard
Stars: ✭ 16 (-27.27%)
Mutual labels:  cybersecurity
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+218.18%)
Mutual labels:  cybersecurity
Memlabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+3063.64%)
Mutual labels:  cybersecurity
passwordstate-decryptor
PowerShell script that decrypts password entries from a Passwordstate server.
Stars: ✭ 19 (-13.64%)
Mutual labels:  red-team
Brutus
Botnet targeting Windows machines written entirely in Python & open source security project.
Stars: ✭ 37 (+68.18%)
Mutual labels:  pentesting
Dawnscanner
Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
Stars: ✭ 642 (+2818.18%)
Mutual labels:  cybersecurity
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+700%)
Mutual labels:  cybersecurity
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+2727.27%)
Mutual labels:  cybersecurity
client-python
OpenCTI Python Client
Stars: ✭ 45 (+104.55%)
Mutual labels:  cybersecurity
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+2645.45%)
Mutual labels:  cybersecurity
DcRat
A simple remote tool in C#.
Stars: ✭ 709 (+3122.73%)
Mutual labels:  red-team
aeacus
🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (+136.36%)
Mutual labels:  cybersecurity
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+2254.55%)
Mutual labels:  cybersecurity
DomainCAT
Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (+54.55%)
Mutual labels:  cybersecurity
SentryPeer
A distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+390.91%)
Mutual labels:  cybersecurity
Cyberprobe
Capturing, analysing and responding to cyber attacks
Stars: ✭ 162 (+636.36%)
Mutual labels:  cybersecurity
Berty
Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
Stars: ✭ 5,101 (+23086.36%)
Mutual labels:  cybersecurity
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-22.73%)
Mutual labels:  red-team
SimpleKeylogger
Simple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (+45.45%)
Mutual labels:  pentesting
adv-dnn-ens-malware
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (+50%)
Mutual labels:  cybersecurity
Python Honeypot
OWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+627.27%)
Mutual labels:  cybersecurity
Buster
An advanced tool for email reconnaissance
Stars: ✭ 387 (+1659.09%)
Mutual labels:  cybersecurity
SWELF
Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (+4.55%)
Mutual labels:  cybersecurity
Elliot
A pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (+4.55%)
Mutual labels:  pentesting
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+168.18%)
Mutual labels:  cybersecurity
Octopus
Octopus - Network Scan/Infos & Web Scan
Stars: ✭ 25 (+13.64%)
Mutual labels:  red-team
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (+600%)
Mutual labels:  cybersecurity
log4j-detector
Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+2727.27%)
Mutual labels:  cybersecurity
Webmap
WebMap-Nmap Web Dashboard and Reporting
Stars: ✭ 357 (+1522.73%)
Mutual labels:  cybersecurity
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+177.27%)
Mutual labels:  cybersecurity
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+26095.45%)
Mutual labels:  cybersecurity
my-cybersecurity-notes
These are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-40.91%)
Mutual labels:  cybersecurity
Malsub
A Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (+1300%)
Mutual labels:  cybersecurity
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (+31.82%)
Mutual labels:  cybersecurity
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+1281.82%)
Mutual labels:  cybersecurity
idsa
This is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (+0%)
Mutual labels:  cybersecurity
XENA
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+477.27%)
Mutual labels:  red-team
Sharp
An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the network.
Stars: ✭ 150 (+581.82%)
Mutual labels:  cybersecurity
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (+577.27%)
Mutual labels:  cybersecurity
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+286.36%)
Mutual labels:  cybersecurity
ArmorLib
Easily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (-9.09%)
Mutual labels:  cybersecurity
Dontclickshit
Як не стати кібер-жертвою
Stars: ✭ 149 (+577.27%)
Mutual labels:  cybersecurity
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+559.09%)
Mutual labels:  cybersecurity
recommendations-for-engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (+268.18%)
Mutual labels:  cybersecurity
Opencti
Authors
Stars: ✭ 2,165 (+9740.91%)
Mutual labels:  cybersecurity
301-360 of 741 similar projects