M507 / Kali-TXLinks
Customized Kali Linux - Ansible playbook
☆66Updated 4 years ago
Alternatives and similar repositories for Kali-TX
Users that are interested in Kali-TX are comparing it to the libraries listed below
Sorting:
- One line PS scripts that may come handy during your network assesment☆77Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Tool for password spraying RDP☆98Updated 7 years ago
- ☆58Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- An epic web shell☆85Updated 5 months ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆111Updated last year
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- ☆54Updated 7 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 8 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 7 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Updated version of C2K☆51Updated 7 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 8 years ago
- ☆81Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- PowerShellUtilities provides various utility commandlets.☆51Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year