DarkWolf-Labs / playbooksLinks
External Playbooks for Public Access
☆39Updated 7 months ago
Alternatives and similar repositories for playbooks
Users that are interested in playbooks are comparing it to the libraries listed below
Sorting:
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆66Updated 9 months ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 6 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 2 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 3 weeks ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 6 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- A Burp extension to help pentesters copy requests / responses for reports.☆49Updated last month
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- A public, open source physical security methodology☆46Updated last year
- ☆55Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- Vast.ai Password Kracking☆84Updated 2 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆86Updated 2 weeks ago
- A safe place to hide all your precious data at.☆24Updated 6 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 4 months ago
- ☆54Updated 7 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 11 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated 3 weeks ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆62Updated 2 weeks ago
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 5 months ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆20Updated 4 months ago
- Hijack a slack bot to phish your way in☆56Updated last month
- ☆38Updated 4 years ago
- Scripts that automate portions of pentests.☆52Updated 3 weeks ago