DarkWolf-Labs / playbooksLinks
External Playbooks for Public Access
☆39Updated 5 months ago
Alternatives and similar repositories for playbooks
Users that are interested in playbooks are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆66Updated 7 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆38Updated 3 weeks ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 5 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 5 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆53Updated 5 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆41Updated last week
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 3 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 4 months ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆19Updated 2 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆76Updated last month
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- A public, open source physical security methodology☆46Updated last year
- Vast.ai Password Kracking☆74Updated last month
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated last month
- ☆28Updated 10 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 3 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 4 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆37Updated last week
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 4 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆117Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 7 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 2 months ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆49Updated this week
- ☆65Updated 2 months ago