ForbiddenProgrammer / conti-pentester-guide-leakLinks
Leaked pentesting manuals given to Conti ransomware crooks
☆1,037Updated 3 years ago
Alternatives and similar repositories for conti-pentester-guide-leak
Users that are interested in conti-pentester-guide-leak are comparing it to the libraries listed below
Sorting:
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,794Updated last year
- ☆1,050Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,002Updated this week
- ☆724Updated 3 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,158Updated last month
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,419Updated last month
- Tools & Interesting Things for RedTeam Ops☆2,205Updated last week
- Red Team Cheatsheet in constant expansion.☆1,205Updated last year
- This project is aimed at freely providing technical guides on various hacking topics.☆886Updated 2 weeks ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆868Updated 4 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,510Updated 3 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,144Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,006Updated last week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,598Updated 2 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,416Updated 2 months ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,155Updated 4 months ago
- Red Team Attack Lab for TTP testing & research☆574Updated 2 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,121Updated 7 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,841Updated 2 months ago
- Organized list of my malware development resources☆1,576Updated 3 years ago
- Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)☆372Updated 3 weeks ago
- A workshop about Malware Development☆1,671Updated 2 years ago
- Some notes and examples for cobalt strike's functionality☆1,091Updated 3 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,620Updated 2 weeks ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,199Updated 2 weeks ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,350Updated 2 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,196Updated 2 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,400Updated 3 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,823Updated last year