Gr1mmie / PentestUtils
random scripts and utilities used for pentesting or R&D purposes
☆9Updated 10 months ago
Alternatives and similar repositories for PentestUtils:
Users that are interested in PentestUtils are comparing it to the libraries listed below
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- Custom pentesting tools☆24Updated 4 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆24Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆13Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 8 months ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆10Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- ☆34Updated 3 weeks ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Hashes of infamous malware☆25Updated last year
- ☆28Updated last year
- scripts to setup environments for red/blue teams.☆16Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆14Updated 5 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆14Updated 6 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- A custom script I created because I got tired of installing my tools manually!☆16Updated last year
- Scripts and One-Liners☆20Updated 2 weeks ago
- Internal Network Penetration Test Playbook☆19Updated 3 years ago