NetSPI / BetaFastLinks
Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series
☆102Updated last year
Alternatives and similar repositories for BetaFast
Users that are interested in BetaFast are comparing it to the libraries listed below
Sorting:
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last month
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- This script is a multi-threaded Okta password sprayer.☆72Updated last year
- ☆104Updated 5 years ago
- Notes for CRTP☆41Updated 4 years ago
- OSWE Preparation☆37Updated 6 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- A list of "secrets" from JWT sample code and readme files.☆56Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- BloodHound Docker Ready to Use☆89Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆29Updated 6 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- ☆117Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- OSCP Cheatsheets☆98Updated 5 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆174Updated 4 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆43Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆231Updated 2 years ago
- ☆79Updated 5 years ago
- ☆82Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated this week
- Ultimate File Transfer List☆62Updated 2 years ago
- ☆150Updated 2 years ago
- Creates and sends fake meeting invite☆67Updated 4 years ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago