CyberSecurityUP / GitHoundSec
☆17Updated last week
Alternatives and similar repositories for GitHoundSec:
Users that are interested in GitHoundSec are comparing it to the libraries listed below
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- ☆15Updated last year
- A small red team course☆37Updated last year
- Public repo of Nuclei scanner templates.☆18Updated last year
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆14Updated 3 years ago
- A Moodle Scanner☆40Updated 5 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- ☆27Updated last year
- Check the Domain for Local Admin Access☆14Updated 2 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆26Updated 3 months ago
- ☆52Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 11 months ago
- ☆27Updated this week
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- A user enumeration tool for Slack.☆28Updated 11 months ago
- Breaking Active Directory Security with 🍞☆33Updated 5 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Tool for scanning domains for .git directories.☆16Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- ☆14Updated last week
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated last year
- ☆22Updated 11 months ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 9 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year