FreeZeroDays / TTPs
Tactics, Techniques, and Procedures
☆19Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for TTPs
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆54Updated 5 months ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆31Updated 2 years ago
- A library that scrapes Linkedin for user data☆22Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆28Updated 2 years ago
- Pentesting notes☆17Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆41Updated last year
- Bash script to generate reverse shell payloads☆20Updated last year
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆21Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆30Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- ☆18Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- VLAN attacks toolkit☆13Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆56Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆24Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆29Updated 4 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆47Updated 4 months ago
- Helpful tools for interacting with a GoPhish phishing instance☆42Updated last month
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆108Updated 3 years ago