Kali Linux Fixes for Newly Imported VM's
☆2,396Jun 30, 2025Updated 8 months ago
Alternatives and similar repositories for pimpmykali
Users that are interested in pimpmykali are comparing it to the libraries listed below
Sorting:
- A tool for parsing breached passwords☆2,093Mar 21, 2024Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,022Feb 12, 2023Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,925Jan 28, 2026Updated last month
- Sample pentest report provided by TCM Security☆1,332Mar 18, 2022Updated 3 years ago
- game of active directory☆7,505Updated this week
- Web recon script. No need to fear, sumrecon is here!☆398Oct 10, 2022Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,424Updated this week
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆150Mar 20, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,511Jan 18, 2026Updated last month
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,089Jun 22, 2024Updated last year
- ☆432Feb 2, 2022Updated 4 years ago
- Powershell tool to automate Active Directory enumeration.☆1,284Sep 9, 2025Updated 6 months ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆798Oct 23, 2020Updated 5 years ago
- A script that you can run in the background!☆3,055Jul 30, 2024Updated last year
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆293Jan 1, 2022Updated 4 years ago
- Trying to tame the three-headed dog.☆4,904Nov 14, 2025Updated 3 months ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,050Jul 30, 2025Updated 7 months ago
- In-depth attack surface mapping and asset discovery☆14,222Updated this week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,325Feb 15, 2026Updated 3 weeks ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,690Mar 2, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,515Updated this week
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,854Dec 25, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,158Updated this week
- The Network Execution Tool☆5,296Feb 27, 2026Updated last week
- pwning IPv4 via IPv6☆1,888Feb 20, 2024Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,488Jan 10, 2025Updated last year
- Monitor linux processes without root permissions☆5,902Mar 1, 2026Updated last week
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆55Jan 22, 2023Updated 3 years ago
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,635Mar 4, 2025Updated last year
- OSWE, OSEP, OSED, OSEE☆3,770Jan 2, 2026Updated 2 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,260Apr 12, 2024Updated last year
- Compilation of Resources for TCM's Linux Privilege Escalation course☆583Oct 23, 2020Updated 5 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,427Jan 19, 2025Updated last year
- A tool to perform Kerberos pre-auth bruteforcing☆3,258Aug 20, 2024Updated last year
- Labs for Practical Malware Analysis & Triage☆1,084Feb 23, 2026Updated 2 weeks ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,305Jan 29, 2026Updated last month
- The ultimate WinRM shell for hacking/pentesting☆5,268Feb 20, 2026Updated 2 weeks ago
- JAWS - Just Another Windows (Enum) Script☆1,919Apr 19, 2021Updated 4 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,529Oct 16, 2025Updated 4 months ago