Charlie-belmer / pentest-pivot-exampleLinks
☆15Updated 6 years ago
Alternatives and similar repositories for pentest-pivot-example
Users that are interested in pentest-pivot-example are comparing it to the libraries listed below
Sorting:
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Import Nmap scans to Cherrytree☆36Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated last year
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- automatic scan for hackthebox☆13Updated 6 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 6 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 6 years ago
- ☆28Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Posts about different topics☆39Updated 5 months ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Updated 5 years ago
- Automatically spin up infra for phishing☆65Updated 6 years ago
- gtfo, now with the speed of golang☆62Updated 5 years ago
- A tool to password spray Jenkins instances☆60Updated 6 years ago
- ☆37Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago