ParrotSec / mimikatz
☆1,284Updated 2 months ago
Related projects: ⓘ
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,184Updated last week
- The ultimate WinRM shell for hacking/pentesting☆4,411Updated 2 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,575Updated last month
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆2,938Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,352Updated last week
- Trying to tame the three-headed dog.☆4,033Updated last week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆2,623Updated 3 weeks ago
- Netcat for windows 32/64 bit☆561Updated 5 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆6,921Updated this week
- A collaborative, multi-platform, red teaming framework☆3,145Updated this week
- game of active directory☆5,047Updated last week
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆3,690Updated 2 months ago
- Privilege Escalation Enumeration Script for Windows☆2,895Updated 2 months ago
- Mimikatz implementation in pure Python☆2,817Updated last month
- Monitor linux processes without root permissions☆4,854Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,141Updated 2 months ago
- Volatility 3.0 development☆2,538Updated this week
- ☆1,010Updated last week
- The Havoc Framework.☆6,640Updated this week
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆1,932Updated last year
- Red Teaming Tactics and Techniques☆3,980Updated 3 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,283Updated 7 months ago
- The Network Execution Tool☆2,854Updated this week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆2,987Updated last month
- Adversary Emulation Framework☆8,249Updated this week
- Windows Exploit Suggester - Next Generation☆4,131Updated last week
- ☆2,186Updated last month
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,380Updated 8 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆6,938Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,296Updated 9 months ago