ContandoBits / CRTO-Cheatsheet-MindmapLinks
A cheatsheet and mindmap for CRTO certification
☆9Updated 2 years ago
Alternatives and similar repositories for CRTO-Cheatsheet-Mindmap
Users that are interested in CRTO-Cheatsheet-Mindmap are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Simple tool to perform HTML Smuggling.☆68Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 7 months ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- this is a simple shell that has the ability to bypass defenses☆13Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- ☆15Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆34Updated 2 years ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆78Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- ☆13Updated 6 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Notification webhook for GoPhish☆54Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆21Updated 7 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- ☆21Updated 3 years ago
- ☆42Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- A C2 framework built for my bachelors thesis☆55Updated 8 months ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- Discord C2 Profile for Mythic☆30Updated 4 months ago
- ☆123Updated last year