Acceis / aspisecLinks
Vacuuming out the remnants of offensive tools. AspiSec is responsible for removing the traces and confidential information left by offensive security tools on an auditor's computer in various cache and log files.
☆13Updated 8 months ago
Alternatives and similar repositories for aspisec
Users that are interested in aspisec are comparing it to the libraries listed below
Sorting:
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- Repo for all my exploits/PoCs☆51Updated 2 months ago
- ☆59Updated 9 months ago
- Tool for scanning domains for .git directories.☆16Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 4 months ago
- Exploits Unauth Docker API☆41Updated 3 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 6 months ago
- Vast.ai Password Kracking☆76Updated last month
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 5 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- ☆28Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- ☆13Updated 3 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 3 months ago
- A small red team course☆40Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last month
- ☆57Updated 8 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Cobalt Strike BOFS☆16Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 3 months ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆14Updated 3 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 5 months ago
- ☆27Updated 2 years ago
- A Moodle Scanner☆42Updated 8 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 10 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 3 months ago