AtvikSecurity / CentralizedPotatoesLinks
A centralized list of the various Potato Windows exploits.
☆20Updated last year
Alternatives and similar repositories for CentralizedPotatoes
Users that are interested in CentralizedPotatoes are comparing it to the libraries listed below
Sorting:
- ☆102Updated last month
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- Red Team AI prompts☆48Updated last month
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- A little cheatsheet for NetExec☆32Updated last year
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- ☆41Updated last week
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆21Updated 7 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- Azure mindmap for penetration tests☆193Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago
- Cloud subdomains identification tool☆63Updated 8 months ago
- ☆109Updated last year
- a map for the azure oriented pentests☆68Updated 2 years ago
- ☆104Updated 3 months ago
- A Red Team Activity Hub☆235Updated 3 weeks ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆103Updated 4 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 5 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A Burp extension to help pentesters copy requests / responses for reports.☆51Updated 6 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 11 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Updated 3 years ago
- ☆54Updated this week
- ☆67Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆125Updated 4 months ago
- ☆37Updated 4 years ago