FreeZeroDays / TTPs
Tactics, Techniques, and Procedures
☆25Updated 2 months ago
Alternatives and similar repositories for TTPs:
Users that are interested in TTPs are comparing it to the libraries listed below
- Enumeration & fingerprint tool☆24Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 4 months ago
- Bash script to generate reverse shell payloads☆19Updated last year
- ☆24Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆31Updated 2 years ago
- ☆12Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆34Updated last year
- Information-Gathering Shell Script☆29Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- DNSrecon tool with GUI for Kali Linux☆56Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Simple recon tool automates your recon process☆16Updated last year
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago