Leaked pentesting manuals given to Conti ransomware crooks
☆1,080Aug 17, 2021Updated 4 years ago
Alternatives and similar repositories for conti-pentester-guide-leak
Users that are interested in conti-pentester-guide-leak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆622Mar 16, 2022Updated 4 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆388Aug 11, 2021Updated 4 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,719Apr 18, 2026Updated 3 weeks ago
- The Havoc Framework☆8,328Dec 18, 2025Updated 4 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,913Oct 29, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,603Jan 18, 2026Updated 3 months ago
- Some notes and examples for cobalt strike's functionality☆1,135Feb 8, 2022Updated 4 years ago
- A workshop about Malware Development☆1,779Jun 2, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,145Jun 10, 2024Updated last year
- Adversary Emulation Framework☆11,160Updated this week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,102Apr 19, 2023Updated 3 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆993Oct 7, 2022Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,255Mar 28, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,386Oct 27, 2023Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆4,442May 1, 2026Updated last week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,680Jul 18, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,733Jul 6, 2025Updated 10 months ago
- game of active directory☆7,771Mar 12, 2026Updated last month
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆134Mar 2, 2022Updated 4 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,175Apr 30, 2026Updated last week
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆180May 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,519Apr 12, 2026Updated 3 weeks ago
- Rust Weaponization for Red Team Engagements.☆3,006Apr 25, 2024Updated 2 years ago
- A self-hosted sandbox for red teams to test payloads against modern detection before deployment. MCP integration lets an LLM agent drive …☆1,412Updated this week
- Defences against Cobalt Strike☆1,302Jul 14, 2022Updated 3 years ago
- Red Teaming Tactics and Techniques☆4,586Aug 22, 2024Updated last year
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,677Apr 20, 2026Updated 2 weeks ago
- Tools & Interesting Things for RedTeam Ops☆2,270Feb 10, 2026Updated 2 months ago
- Sandman is a NTP based backdoor for hardened networks.☆818Mar 31, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆18,183Sep 10, 2025Updated 7 months ago
- a tool to help operate in EDRs' blind spots☆770Dec 2, 2024Updated last year
- Offensive Software Exploitation Course☆2,514May 31, 2023Updated 2 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,941Jun 27, 2023Updated 2 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,201Apr 15, 2026Updated 3 weeks ago
- ☆721Mar 22, 2024Updated 2 years ago