Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for red team pentest tool
pentest-tool
x
red-team
x
16 search results found
Dirsearch
⭐
11,165
Web path scanner
1earn
⭐
4,841
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Redteam Tools
⭐
4,019
Tools and Techniques for Red Team / Penetration Testing
Winpwn
⭐
3,151
Automation for internal Windows Penetrationtest / AD-Security
Stowaway
⭐
2,195
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Ligolo Ng
⭐
1,950
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Venom
⭐
1,911
Venom - A Multi-hop Proxy for Penetration Testers
Dismap
⭐
1,840
Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点
Netexec
⭐
1,596
The Network Execution Tool
Cloakify
⭐
1,483
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Lockdoor Framework
⭐
1,254
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Perun
⭐
1,037
Perun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫
Inventory
⭐
1,019
Asset inventory of over 800 public bug bounty programs.
Cloudbrute
⭐
750
Awesome cloud enumerator
Dumpsterfire
⭐
709
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Blackmamba
⭐
688
C2/post-exploitation framework
Packetwhisper
⭐
605
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Impost3r
⭐
556
👻Impost3r -- A linux password thief
Bigbountyrecon
⭐
471
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Overlord
⭐
463
Overlord - Red Teaming Infrastructure Automation
Pentest101
⭐
456
一些关于渗透测试的Tips
Pivotsuite
⭐
423
Network Pivoting Toolkit
Koko Moni
⭐
338
一个网络空间搜索引擎监控平台,可定时进行资产信息爬取,及时发现新增资产,本项目聚合了 Fofa、Hunter、Quake、Zoomeye 和 Threatbook 的数据源,并对获取到的数据进行去重与清洗
Amnesiac
⭐
157
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Airmaster
⭐
131
Use ExpiredDomains.net and BlueCoat to find useful domains for red team.
Pentesting Dockerfiles
⭐
126
Pentesting/Bugbounty Dockerfiles.
Notionterm
⭐
108
🖥️📖 Embed reverse shell in Notion pages
Lazypariah
⭐
90
A tool for generating reverse shell payloads on the fly.
Turbo Attack
⭐
87
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
Recon
⭐
73
Enumerate a target Based off of Nmap Results
Simwigo
⭐
49
Simwigo is a cross-platform tool, written in Go, to simplify the deployment of a web service.
Ezea
⭐
45
EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
Unauthorized
⭐
44
常见的未授权漏洞检测
Exchange Penetration Testing
⭐
41
The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)
Volana
⭐
39
🌒 Shell command obfuscation to avoid detection systems
Pathprober
⭐
26
Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once
Responder Parser
⭐
23
Most Responder's configuration power in your hand
Transportc2
⭐
22
PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Spraycannon
⭐
22
Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend database
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Unauthorized_com
⭐
19
未授权检测的命令行版,支持批量检测
Pendock
⭐
18
A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access either via X2Go or VNC
S3 Buckets Aio Pwn
⭐
18
An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full of buckets, and check all of them with various attack scenarios if they are vulnerable
Behold3r
⭐
15
收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Addreferencedotredteam
⭐
12
A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collection of C# red team projects in 1 Lib.
Rti Toolkit
⭐
12
Remote Template Injection Toolkit
Red Team Tools
⭐
11
Repo containing cracked red teaming tools.
Apache Tomcat Pentesting
⭐
11
Apache Tomcat exploit and Pentesting guide for penetration tester
Aws Loot
⭐
11
Pull secrets from an AWS environment
Macgonuts
⭐
9
💻 🔌 📡 🔨 🔧 🔎 💣 ♠️ 👾 :trollface: :godmode: An ARP/NDP swiss army knife to make MAC going nuts on networks around!
Gh0stbust3rz
⭐
8
Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game
Dnskron
⭐
8
Fast DNS history enumeration tool for network and OSINT investigations
Badstrings
⭐
7
List of Bad Strings for red teamers
Bypassetw_csharp
⭐
5
Bypassing ETW with Csharp
Porunga
⭐
5
Aerial platform for Recon, Intelligence and Pentesting. #R-KALI #Porunga
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Related Searches
Penetration Testing Pentest Tool (344)
1-16 of 16 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.