Prune2000 / prune2000.github.io
My security blog: CTF writeups, pentesting experiments, network forensics, and a long chaotic list of tools. https://prune2000.github.io/
☆35Updated 4 years ago
Related projects: ⓘ
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 4 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 5 years ago
- ☆142Updated this week
- Testing/collecting some container breakouts☆93Updated 5 years ago
- ☆70Updated this week
- A collection of my Dockerfiles☆87Updated last year
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- NebulousAD automated credential auditing tool.☆155Updated 4 years ago
- ☆55Updated this week
- Linux Local Privesc Helper and Agent☆165Updated 4 years ago
- Nmap Script to scan for Winnti infections☆70Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆57Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 4 years ago
- ☆76Updated this week
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆16Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆160Updated 4 years ago
- Pypykatz server☆124Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Web Sight Docker Deployment☆125Updated 6 years ago
- cracke-dit ("Cracked It") makes it easier to perform regular password audits against Active Directory environments.☆111Updated last year
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 6 years ago
- Useful Powershell modules.☆11Updated 7 years ago
- ☆8Updated 7 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 3 months ago
- ☆101Updated 5 years ago
- zsh plugin for metasploit framework☆14Updated 6 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆54Updated 5 years ago
- Slides from various talks that I've given over the years☆117Updated last year