CronUp / VulnerabilidadesLinks
☆119Updated 2 years ago
Alternatives and similar repositories for Vulnerabilidades
Users that are interested in Vulnerabilidades are comparing it to the libraries listed below
Sorting:
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- ☆29Updated 4 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- ☆40Updated 2 years ago
- a map for the azure oriented pentests☆67Updated last year
- ☆99Updated 3 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆102Updated last year
- MayorSec DNS Enumeration Tool☆87Updated 6 months ago
- Windows for Red Teamers☆126Updated 3 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- ☆66Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆55Updated last year
- Upload files done during my research.☆161Updated 2 months ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- ☆64Updated 2 years ago
- ☆123Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆198Updated last month
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆256Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆82Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- A WLAN red team framework.☆156Updated 8 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆101Updated 2 weeks ago