ContandoBits / CRTO-Cheatsheet-Mindmap
A cheatsheet and mindmap for CRTO certification
☆8Updated last year
Alternatives and similar repositories for CRTO-Cheatsheet-Mindmap:
Users that are interested in CRTO-Cheatsheet-Mindmap are comparing it to the libraries listed below
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- Discord C2 Profile for Mythic☆26Updated this week
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- ☆14Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 2 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- .NET wrapper around LogonUserA to test creds☆11Updated 2 years ago
- ☆15Updated last year
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Updated 5 years ago
- ☆47Updated 2 years ago
- ☆16Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago
- Automatically deploy Nemesis☆20Updated 8 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆13Updated 2 years ago
- ☆29Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Custom queries list for BloodHound☆23Updated 5 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 9 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆79Updated last year