ContandoBits / CRTO-Cheatsheet-Mindmap
A cheatsheet and mindmap for CRTO certification
☆9Updated 2 years ago
Alternatives and similar repositories for CRTO-Cheatsheet-Mindmap:
Users that are interested in CRTO-Cheatsheet-Mindmap are comparing it to the libraries listed below
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- ☆14Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆47Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆17Updated 6 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 2 years ago
- ☆16Updated 3 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆43Updated 2 years ago
- .Net Assembly loader for the GMSAPasswordReader☆12Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 10 months ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆52Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- ☆15Updated 4 months ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 4 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year