Cyberwatch / Pentest-Collaboration-FrameworkLinks
☆18Updated last year
Alternatives and similar repositories for Pentest-Collaboration-Framework
Users that are interested in Pentest-Collaboration-Framework are comparing it to the libraries listed below
Sorting:
- ☆55Updated last year
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆41Updated 3 months ago
- ☆35Updated 3 years ago
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ☆64Updated 2 years ago
- ☆26Updated 2 years ago
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- ☆25Updated this week
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- ☆31Updated 2 months ago
- Mind Maps for penetration testing☆20Updated 4 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆55Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 3 months ago
- ☆43Updated last year
- A collection of config files for linux focusing on hackthebox theme☆45Updated 5 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated 11 months ago
- ☆39Updated 5 months ago
- Automated solution for nmap'ing☆27Updated 2 years ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆20Updated 5 months ago
- Challenge Python☆19Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 2 weeks ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆42Updated 2 weeks ago
- Track C2 servers, tools, and botnets over time by framework and location☆39Updated 3 months ago
- ☆54Updated 4 months ago
- ☆55Updated 2 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆27Updated 6 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 7 months ago
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆53Updated 4 months ago