HernanRodriguez1 / 1nv0k3-Rvb3us2Links
☆12Updated 3 years ago
Alternatives and similar repositories for 1nv0k3-Rvb3us2
Users that are interested in 1nv0k3-Rvb3us2 are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- ☆99Updated 3 years ago
- ☆13Updated 2 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 6 years ago
- AzureAD Pentest☆23Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- ☆12Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- Password list generator for password spraying - prebaked with goodies☆105Updated 2 years ago
- ☆140Updated last year
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆68Updated last year
- ☆38Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- ☆38Updated 4 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ☆13Updated 6 months ago
- Simple tool to perform HTML Smuggling.☆68Updated 4 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆19Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated 11 months ago
- Fly into Gophish with One Click (Infra Automation)☆50Updated 2 years ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 9 months ago