Propolisa / SevenLinks
A Discord bot for Hack The Box teams.
☆23Updated 2 years ago
Alternatives and similar repositories for Seven
Users that are interested in Seven are comparing it to the libraries listed below
Sorting:
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆58Updated 2 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- CLI monitor for windows process- & file activity☆87Updated 4 years ago
- generate payloads that force authentication against an attacker machine☆107Updated 2 years ago
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- ☆29Updated 4 years ago
- ☆34Updated 3 years ago
- ☆34Updated 3 years ago
- Code dump from PEN-300/OSEP updated 2022☆41Updated 2 years ago
- AzureAD Pentest☆20Updated 3 years ago
- A variety of AV evasion techniques written in C# for practice.☆92Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆13Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆74Updated 10 months ago
- ☆58Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 5 months ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- rcat☆68Updated 3 years ago
- OSCP Cheatsheets☆98Updated 5 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆105Updated 3 years ago
- ☆93Updated 4 years ago
- Payload Generation Framework☆91Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- Creates and sends fake meeting invite☆64Updated 4 years ago
- ☆61Updated 5 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆130Updated last year
- ☆70Updated 3 months ago
- Identifies the bytes that Microsoft Defender flags on.☆88Updated 3 years ago