Agahlot / RTFM
Red Team Field Manual
☆71Updated 8 years ago
Alternatives and similar repositories for RTFM:
Users that are interested in RTFM are comparing it to the libraries listed below
- ☆52Updated 4 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- Python Tool for Host Enumeration☆50Updated 7 years ago
- Learnings from OSCP and other random stuff.☆32Updated last year
- Powershell Empire Persistence finder☆119Updated 8 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆99Updated 2 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆75Updated 10 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 7 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- ☆51Updated 8 years ago
- An automated SMB relay exploitation script.☆152Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆87Updated 9 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 7 months ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- ☆92Updated 6 years ago
- 504 VSAgent☆23Updated 7 years ago
- ☆59Updated 4 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 6 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 8 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 7 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- tools for analyzing strings from password lists☆58Updated 2 years ago
- ☆26Updated 7 years ago
- Active Directory enumeration from non-domain system.☆118Updated 8 years ago