Reduati / AutoWinLinks
Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
☆20Updated 4 years ago
Alternatives and similar repositories for AutoWin
Users that are interested in AutoWin are comparing it to the libraries listed below
Sorting:
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- ☆54Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆58Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Some random tools I use for penetration testing☆90Updated 3 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated 9 months ago
- PowerShell payload generator☆117Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆61Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆44Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Updated 3 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Basic Dart reverse shell code☆21Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Sp00fer blog post -☆26Updated 3 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago