BlWasp / NetExec-Cheatsheet
A little cheatsheet for NetExec
☆22Updated 11 months ago
Alternatives and similar repositories for NetExec-Cheatsheet:
Users that are interested in NetExec-Cheatsheet are comparing it to the libraries listed below
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆41Updated 2 weeks ago
- ☆47Updated 2 years ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 2 months ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆22Updated 3 years ago
- Discord C2 Profile for Mythic☆28Updated last month
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- ☆13Updated 2 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last week
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- PowerShell Reverse Shell☆61Updated last year
- ☆106Updated 4 months ago
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- ☆52Updated last week
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆24Updated 2 months ago
- ☆52Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- ☆26Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆74Updated 2 years ago