0xJs / CRTE-CheatsheetLinks
☆38Updated 3 years ago
Alternatives and similar repositories for CRTE-Cheatsheet
Users that are interested in CRTE-Cheatsheet are comparing it to the libraries listed below
Sorting:
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆80Updated 3 weeks ago
- ☆38Updated 4 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆21Updated last year
- ☆47Updated 3 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆113Updated 3 years ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- ☆42Updated 3 years ago
- C2 Automation using Linode☆84Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 3 weeks ago
- Custom queries list for BloodHound☆29Updated last month
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- ☆87Updated 6 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆70Updated 5 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- offensive notes & resources☆43Updated 4 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Automated exploitation of MSSQL servers at scale☆115Updated last week
- ☆51Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago