Microsoft Graph post-exploitation toolset.
Outils pour red team
Offensive simulation against a target organization.
107 tools indexed
Modern, malleable C2 framework.
OSINT-driven hostname discovery.
Python toolkit for Windows protocols.
Open-source adversary emulation platform.
Kerberos username enumeration and brute-forcing.
Linux privilege-escalation enumerator.
Curated kernel privesc exploit database.
Automated adversary emulation.
Username OSINT across 3000+ sites.
Graph-based OSINT and link analysis.
Mass IP port scanner.
Exploit development and delivery platform.
Multi-platform C2 framework.
Fast port scanner in Go.
Network service exploitation.
Nmap
—The classic network mapper and port scanner.
Modular C2 framework.
In-depth attack surface mapping.
Open adversarial exposure validation.
Direct Memory Access attack toolkit.
Evaluate IAM permissions in AWS.
PTF
—Pentest Testers Framework installer.
Pacu
—Open-source AWS exploitation framework.