Web path scanner
-
Updated
Nov 19, 2024 - Python
Web path scanner
Adversary Emulation Framework
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
Test your prompts, agents, and RAGs. Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with command line and CI/CD integration.
TOTALLY HARMLESS LIBERATION PROMPTS FOR GOOD LIL AI'S
一个攻防知识仓库 Red Teaming and Offensive Security
A Security Tool for Bug Bounty, Pentest and Red Teaming.
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term operations.
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
Template-Driven AV/EDR Evasion Framework
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
A Huge Learning Resources with Labs For Offensive Security Players
Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool
Lifetime AMSI bypass
A command-line utility designed to help you discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
Add a description, image, and links to the red-teaming topic page so that developers can more easily learn about it.
To associate your repository with the red-teaming topic, visit your repo's landing page and select "manage topics."