Skip to content
#

red-teaming-tools

Here are 26 public repositories matching this topic...

A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.

  • Updated Apr 13, 2025
  • Go

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments

  • Updated Mar 18, 2025
  • PowerShell

A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embedded in webpages, parsing resources like sitemaps and robots.txt files, and even processing local files - to uncover every URL.

  • Updated Apr 13, 2025
  • Go

The Passive Company Scanner is a passive vulnerability scanning tool. By entering a company's name, it identifies associated IP addresses and gathers information on open ports, vulnerabilities, and more. It uses non-invasive techniques to map the attack surface without directly interacting with the targets.

  • Updated May 19, 2024
  • Python

This tool automates domain screenshot capture using Selenium with VPN rotation, session tracking, and failure retries. It supports both OpenVPN and NordVPN. It generates interactive HTML reports with navigation, filtering, and removing visually similar duplicates using perceptual image comparison.

  • Updated Mar 21, 2025
  • Python

Improve this page

Add a description, image, and links to the red-teaming-tools topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the red-teaming-tools topic, visit your repo's landing page and select "manage topics."

Learn more