BlWasp / nmapCTFLinks
A Nmap script optimized for Hack the Box and CTFs
☆13Updated 4 years ago
Alternatives and similar repositories for nmapCTF
Users that are interested in nmapCTF are comparing it to the libraries listed below
Sorting:
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- Collection of GoPhish templates available for legitimate usage.☆158Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- A toolkit for your red team operations☆27Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆296Updated 4 years ago
- ☆123Updated last year
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆11Updated 4 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆179Updated last year
- A Zphisher GUI Back-Office Plugin☆225Updated last year
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆151Updated 10 months ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆30Updated 10 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆335Updated 10 months ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆161Updated last week
- The Havoc Framework☆59Updated 2 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆211Updated 5 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- ☆160Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆120Updated 3 years ago
- Active Directory Pentesting Full Course - Red Team Hacking☆28Updated 3 years ago