MiSERYYYYY / pentesting-cheatsheetLinks
☆13Updated 8 months ago
Alternatives and similar repositories for pentesting-cheatsheet
Users that are interested in pentesting-cheatsheet are comparing it to the libraries listed below
Sorting:
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- Collection of tools to use with Azure Applications☆111Updated 2 years ago
- Efflanrs - GUI for Snaffler Output☆27Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- Custom queries list for BloodHound☆31Updated 5 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- ☆119Updated 4 years ago
- ☆25Updated 2 years ago
- ☆79Updated 10 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆97Updated last year
- Modular Enumeration and Password Spraying Framework☆128Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆99Updated 3 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆91Updated 5 months ago
- ☆40Updated 4 years ago
- Malware As A Service☆135Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆49Updated 5 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago
- ☆105Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Library of sites for categorization☆28Updated 6 years ago
- ☆143Updated 2 years ago
- ☆120Updated 8 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆99Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago