Reduati / AutoWin
Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
☆19Updated 3 years ago
Alternatives and similar repositories for AutoWin:
Users that are interested in AutoWin are comparing it to the libraries listed below
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- offensive notes & resources☆40Updated last week
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- ☆54Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆27Updated 2 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆24Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆59Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆20Updated last month
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- ☆16Updated 4 years ago
- A tool to password spray Jenkins instances☆54Updated 5 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 3 years ago