randomtable's Projects
Perform general security checks against AD environment
GPOs for your systems
In-depth Attack Surface Mapping and Asset Discovery
Remove Certificate Pinning from APKs
Ansible automation for Authentication Services
Ruby script to automate metasploit scanning, exploitation, and post-exploitation
A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.
This is based on Arkane Linux's ISO build scripts.
A seamless blend of all Linux distributions.
Bootstrap Italia รจ un tema Bootstrap 4 conforme alle linee guida di design per i servizi web della PA
Componenti aggiuntivi per Bootstrap Italia
:fire: CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.
ChatGPT DAN, Jailbreaks prompt
A project for help people to run their own Tor services
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
AI companions with memory: a lightweight stack to create and host your own AI companions
A tool to download recursively ThreatCrowd Data
Simple daemon to tunnel DNS requests over SOCKS
Selective DNS proxy forwarding based on DNS threat blocking providers intelligence.
docker systemctl replacement - allows to deploy to systemd-controlled containers without starting an actual systemd daemon (e.g. centos7, ubuntu16)
Make bootable Linux disk image abusing Docker
Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.
Fast PlayStation 1 emulator for x86-64/AArch32/AArch64
:memo: A text file containing 479k English words for all your dictionary/word-based projects e.g: auto-completion / autosuggestion
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
16-bit CPU for Excel, and related files
A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell
Irregular methods on regular expressions
Pen Test Report Generation and Assessment Collaboration
List of Vulnerabilities in Integrity RTOS