Leaked pentesting manuals given to Conti ransomware crooks
☆1,074Aug 17, 2021Updated 4 years ago
Alternatives and similar repositories for conti-pentester-guide-leak
Users that are interested in conti-pentester-guide-leak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆619Mar 16, 2022Updated 4 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆387Aug 11, 2021Updated 4 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,641Mar 18, 2025Updated last year
- The Havoc Framework☆8,274Dec 18, 2025Updated 3 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,904Oct 29, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,576Jan 18, 2026Updated 2 months ago
- Some notes and examples for cobalt strike's functionality☆1,132Feb 8, 2022Updated 4 years ago
- A workshop about Malware Development☆1,774Jun 2, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,129Jun 10, 2024Updated last year
- Adversary Emulation Framework☆10,986Apr 10, 2026Updated last week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,096Apr 19, 2023Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆994Oct 7, 2022Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆4,409Apr 10, 2026Updated last week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,664Jul 18, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,729Jul 6, 2025Updated 9 months ago
- game of active directory☆7,691Mar 12, 2026Updated last month
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆134Mar 2, 2022Updated 4 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated last month
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆177May 11, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,470Updated this week
- Rust Weaponization for Red Team Engagements.☆2,996Apr 25, 2024Updated last year
- Defences against Cobalt Strike☆1,297Jul 14, 2022Updated 3 years ago
- Red Teaming Tactics and Techniques☆4,549Aug 22, 2024Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,347Nov 12, 2025Updated 5 months ago
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,660Apr 10, 2026Updated last week
- Tools & Interesting Things for RedTeam Ops☆2,267Feb 10, 2026Updated 2 months ago
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,953Sep 10, 2025Updated 7 months ago
- a tool to help operate in EDRs' blind spots☆768Dec 2, 2024Updated last year
- Offensive Software Exploitation Course☆2,512May 31, 2023Updated 2 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆817Oct 27, 2023Updated 2 years ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,922Jun 27, 2023Updated 2 years ago
- ☆720Mar 22, 2024Updated 2 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,154Jul 19, 2024Updated last year