DarkWolf-Labs / playbooksLinks
External Playbooks for Public Access
☆39Updated 4 months ago
Alternatives and similar repositories for playbooks
Users that are interested in playbooks are comparing it to the libraries listed below
Sorting:
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆18Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆65Updated 6 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- Enumerate AWS permissions and resources.☆69Updated 2 years ago
- Scripts that automate portions of pentests.☆50Updated last month
- ☆27Updated 8 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆38Updated 2 weeks ago
- Lena's scripts/code/resources for malware analysis☆27Updated 11 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆17Updated 5 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- ☆12Updated 11 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆20Updated 2 months ago
- A Moodle Scanner☆42Updated 6 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 6 months ago
- A small red team course☆39Updated 2 years ago
- Artifact monitoring that ensures fairplay☆75Updated 4 months ago
- ☆37Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆110Updated last month
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆48Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆55Updated last year
- ☆59Updated 8 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆35Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Situational Awareness script to identify how and where to run implants☆50Updated 6 months ago