CyberOne-TeamARES / FallOfSudo
Pwning Sudo Rules
☆24Updated 3 years ago
Alternatives and similar repositories for FallOfSudo
Users that are interested in FallOfSudo are comparing it to the libraries listed below
Sorting:
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 6 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 3 months ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- CLI monitor for windows process- & file activity☆87Updated 4 years ago
- linikatz is a tool to attack AD on UNIX☆146Updated last year
- ☆67Updated 2 weeks ago
- Automate converting webshells into reverse shells.☆69Updated last month
- #cheat sheet for OSWP☆8Updated 4 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Creates and sends fake meeting invite☆59Updated 4 years ago
- ☆35Updated 3 years ago
- C# implementation of harmj0y's PowerView☆25Updated 5 years ago
- ☆21Updated last year
- ☆18Updated 7 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- ☆64Updated 2 weeks ago
- ☆90Updated 4 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated 11 months ago
- ☆35Updated 5 months ago
- Creating a Malicious Macro using MS Word☆22Updated 2 years ago
- LDAP Enumeration Tool for Pentesters☆43Updated 3 weeks ago
- ☆58Updated 2 months ago
- Azure Service Subdomain Enumeration☆59Updated 8 months ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆21Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆66Updated 2 years ago
- Exploit to dump ipmi hashes☆34Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆101Updated 6 months ago
- ☆31Updated 3 years ago