AtvikSecurity / CentralizedPotatoesLinks
A centralized list of the various Potato Windows exploits.
☆20Updated last year
Alternatives and similar repositories for CentralizedPotatoes
Users that are interested in CentralizedPotatoes are comparing it to the libraries listed below
Sorting:
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- Red Team AI prompts☆48Updated 2 months ago
- ☆104Updated 2 months ago
- ☆136Updated last month
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆21Updated 7 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 6 months ago
- Interactive results explorer and annotation tool for Nosey Parker☆47Updated 7 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- A little cheatsheet for NetExec☆32Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆75Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Updated 3 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆50Updated this week
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- ☆22Updated last year
- Cloud subdomains identification tool☆62Updated 9 months ago
- ☆55Updated last month
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 7 months ago
- ☆37Updated 4 years ago
- ☆67Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Updated 6 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Updated 11 months ago
- a map for the azure oriented pentests☆70Updated 2 years ago
- ☆105Updated 4 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆46Updated 6 months ago