0xJs / CRTE-Cheatsheet
☆25Updated 2 years ago
Related projects: ⓘ
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆12Updated 6 months ago
- User enumeration and password spraying tool for testing Azure AD☆67Updated 2 years ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆0Updated 3 months ago
- Red Teaming & Active Directory Cheat Sheet.☆39Updated 11 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆47Updated 3 weeks ago
- ☆46Updated 2 years ago
- ☆30Updated 6 months ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆12Updated 2 years ago
- Extra cmdlets to help with quering security related information from Azure☆13Updated this week
- ☆15Updated 2 years ago
- A Python based ingestor for BloodHound☆81Updated last year
- A repository with my code snippets for research/education purposes.☆51Updated last year
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆19Updated 3 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 5 months ago
- ☆19Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- Get SYSTEM via SeDebugPrivilege☆15Updated 2 years ago
- ☆15Updated 10 months ago
- Azure pentesting reference for Altered Security Lab☆24Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆19Updated 3 years ago
- PowerShell Reverse Shell☆60Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆20Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Simple AV Evasion for PE Files☆40Updated 2 years ago
- ☆10Updated last year
- ☆41Updated 2 years ago
- Vulnerable Windows Application☆15Updated 9 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆53Updated 9 months ago
- ☆50Updated 11 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year