AmadeusITGroup / pwndoc1ALinks
Pentest Report Manager
☆26Updated 8 months ago
Alternatives and similar repositories for pwndoc1A
Users that are interested in pwndoc1A are comparing it to the libraries listed below
Sorting:
- Custom queries list for BloodHound☆31Updated 5 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ☆105Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆45Updated last year
- ☆101Updated last month
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Updated 9 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆92Updated 3 weeks ago
- The CAPTCHA-resilient contact scraper.☆42Updated last month
- Malware As A Service☆135Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆82Updated last week
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆91Updated 5 months ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆115Updated 5 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Updated last year
- ☆41Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 9 months ago
- using graph proxy to monitor teams user presence☆55Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆22Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- Living Off the Foreign Land setup scripts☆73Updated 10 months ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 3 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆136Updated 4 months ago
- ☆23Updated 2 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A little cheatsheet for NetExec☆31Updated last year