JoelGMSec / AIkidoLinks
Fake API Server for AI-Bypass
☆26Updated 2 months ago
Alternatives and similar repositories for AIkido
Users that are interested in AIkido are comparing it to the libraries listed below
Sorting:
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆123Updated 4 months ago
- ☆38Updated 4 years ago
- Exploit to dump ipmi hashes☆37Updated 2 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Updated last year
- Azure Service Subdomain Enumeration☆67Updated last year
- C# Process Hollowing POC☆17Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆21Updated 2 years ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Updated last year
- ☆15Updated 2 years ago
- ☆102Updated 10 months ago
- ☆31Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Creating a Malicious Macro using MS Word☆25Updated 3 years ago
- sturdy-chainsaw☆67Updated 2 years ago
- ☆91Updated 2 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆29Updated this week
- Review of AWAE.OSWE☆31Updated 3 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆69Updated last year
- ☆74Updated last week
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- Red Teaming tools and techniques☆55Updated 2 years ago
- A cheatsheet for NetExec☆158Updated 6 months ago
- ☆54Updated 2 years ago
- Spoofcheck☆45Updated 6 months ago
- ☆36Updated last year
- Ready to go Phishing Platform☆57Updated last year
- ☆73Updated 9 months ago