FreeZeroDays / TTPsLinks
Tactics, Techniques, and Procedures
☆25Updated 5 months ago
Alternatives and similar repositories for TTPs
Users that are interested in TTPs are comparing it to the libraries listed below
Sorting:
- Enumeration & fingerprint tool☆25Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆36Updated last month
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ☆25Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆12Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- Bash script to generate reverse shell payloads☆20Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Quicky serve files over http or https using flask.☆35Updated 5 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 2 months ago
- Classic Web shell upload techniques & Web RCE techniques☆32Updated 8 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆42Updated 4 years ago
- ☆28Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago