PacktPublishing / Cybersecurity-Attacks-Red-Team-StrategiesLinks
☆24Updated 4 years ago
Alternatives and similar repositories for Cybersecurity-Attacks-Red-Team-Strategies
Users that are interested in Cybersecurity-Attacks-Red-Team-Strategies are comparing it to the libraries listed below
Sorting:
- Advanced Infrastructure Penetration Testing, published by Packt☆29Updated 2 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- ☆80Updated 5 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆67Updated 5 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆110Updated 10 months ago
- ☆48Updated last month
- A repo to support the book☆45Updated 2 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆27Updated 3 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆25Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆91Updated 2 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 7 years ago
- ☆70Updated 2 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 6 years ago
- NessusV2 File Parser☆66Updated 3 years ago
- Automatically exported from code.google.com/p/nipper-ng☆71Updated 3 years ago
- Brute-force Cisco SSL VPN☆53Updated 5 years ago
- Hands-on Security Automation in DevOps, published by Packt☆52Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago