FreeZeroDays / TTPsLinks
Tactics, Techniques, and Procedures
☆25Updated 5 months ago
Alternatives and similar repositories for TTPs
Users that are interested in TTPs are comparing it to the libraries listed below
Sorting:
- Enumeration & fingerprint tool☆24Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- Classic Web shell upload techniques & Web RCE techniques☆31Updated 7 months ago
- ☆25Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆35Updated 2 weeks ago
- Tools used for Pentesting☆22Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- A little cheatsheet for NetExec☆22Updated last year
- ☆47Updated 3 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆12Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 weeks ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆18Updated 2 years ago
- RedTeam - Red Team Tools☆47Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆17Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆46Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆12Updated 2 years ago