DarkWolf-Labs / playbooksLinks
External Playbooks for Public Access
☆39Updated 6 months ago
Alternatives and similar repositories for playbooks
Users that are interested in playbooks are comparing it to the libraries listed below
Sorting:
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆66Updated 8 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 6 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆32Updated last week
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆39Updated last month
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated this week
- A public, open source physical security methodology☆46Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.☆48Updated last month
- ☆55Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆42Updated last month
- Artifact monitoring that ensures fairplay☆77Updated 6 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 9 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 11 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 5 months ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Verizon Burp Extensions: AI Suite☆132Updated 3 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- ☆116Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 5 months ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆19Updated 3 months ago
- Scripts that automate portions of pentests.☆52Updated last week
- Vast.ai Password Kracking☆80Updated last month
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆24Updated 8 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year