AtvikSecurity / CentralizedPotatoesLinks
A centralized list of the various Potato Windows exploits.
☆15Updated 8 months ago
Alternatives and similar repositories for CentralizedPotatoes
Users that are interested in CentralizedPotatoes are comparing it to the libraries listed below
Sorting:
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated 2 months ago
- ☆38Updated last month
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 3 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 7 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated last month
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆91Updated last month
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆155Updated 7 months ago
- ☆85Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- ☆55Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- A Red Team Activity Hub☆222Updated last month
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆67Updated 9 months ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 5 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last month
- Dredging up secrets from the depths of the file system☆131Updated 10 months ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Security feed, done in the stupid simple way☆26Updated 8 months ago
- Exploit to dump ipmi hashes☆36Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- ☆91Updated 7 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆25Updated 10 months ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Burp Suite extension for testing Passkey systems.☆74Updated 5 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago