G37SYS73M / win_tool_hub
Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.
☆20Updated 2 years ago
Alternatives and similar repositories for win_tool_hub:
Users that are interested in win_tool_hub are comparing it to the libraries listed below
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- ☆41Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆47Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆19Updated last year
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 2 years ago
- Resources for AD penetration testing and security☆29Updated 3 years ago
- A collection of red blue team staff☆46Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- ☆11Updated last year
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 8 months ago
- ☆96Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆22Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- ☆12Updated 3 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 4 months ago
- ☆27Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Network penetration testing toolset wrapper☆81Updated 2 years ago