Skip to content
View RabidRoot's full-sized avatar
🎯
nothing
🎯
nothing

Block or report RabidRoot

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
14 stars written in Go
Clear filter

Information gathering framework for phone numbers

Go 13,429 3,779 Updated Jun 30, 2024

Fast web fuzzer written in Go

Go 12,985 1,325 Updated Jun 30, 2024

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 11,375 2,034 Updated Aug 21, 2024

The Havoc Framework

Go 7,008 982 Updated Jan 8, 2025

⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

Go 6,780 584 Updated Mar 12, 2024

An HTTP toolkit for security research.

Go 6,173 352 Updated Jan 3, 2025

🔪 :octocat: Leak git repositories from misconfigured websites

Go 1,556 122 Updated Dec 23, 2022

Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)

Go 1,018 79 Updated Nov 9, 2024

Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.

Go 944 174 Updated Nov 12, 2024

A GNU/Linux monitoring and profiling tool focused on single processes.

Go 674 37 Updated Nov 14, 2021

An Office365 User Attack Tool

Go 627 102 Updated Mar 19, 2024

Scrape/Parse Pastebin using GO and expression grammar (PEG)

Go 97 11 Updated Dec 10, 2024

Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).

Go 29 4 Updated Aug 19, 2020

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Go 13 4 Updated Apr 6, 2024