Leaked pentesting manuals given to Conti ransomware crooks
☆1,074Aug 17, 2021Updated 4 years ago
Alternatives and similar repositories for conti-pentester-guide-leak
Users that are interested in conti-pentester-guide-leak are comparing it to the libraries listed below
Sorting:
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,900Oct 29, 2025Updated 4 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,511Jan 18, 2026Updated last month
- A workshop about Malware Development☆1,765Jun 2, 2023Updated 2 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,534Mar 18, 2025Updated 11 months ago
- The Havoc Framework☆8,203Dec 18, 2025Updated 2 months ago
- Some notes and examples for cobalt strike's functionality☆1,127Feb 8, 2022Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,097Apr 19, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,695Jul 6, 2025Updated 8 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,625Jul 18, 2024Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- Adversary Emulation Framework☆10,759Updated this week
- game of active directory☆7,505Updated this week
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆387Aug 11, 2021Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,607Nov 14, 2025Updated 3 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆4,333Feb 19, 2026Updated 2 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,416Dec 20, 2025Updated 2 months ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,300Aug 15, 2024Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,900Jun 27, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,495Aug 22, 2024Updated last year
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,483Feb 16, 2026Updated 2 weeks ago
- Rust Weaponization for Red Team Engagements.☆2,988Apr 25, 2024Updated last year
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,643Jul 27, 2025Updated 7 months ago
- Defences against Cobalt Strike☆1,296Jul 14, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,631Aug 6, 2022Updated 3 years ago
- Red Team Cheatsheet in constant expansion.☆1,263Dec 28, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,056Dec 11, 2024Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,258Feb 10, 2026Updated 3 weeks ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆550Jul 16, 2021Updated 4 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆502May 16, 2023Updated 2 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆570Mar 28, 2024Updated last year