ShutdownRepo / The-Hacker-ToolsLinks
This project is aimed at freely providing technical guides on various hacking tools.
☆113Updated last year
Alternatives and similar repositories for The-Hacker-Tools
Users that are interested in The-Hacker-Tools are comparing it to the libraries listed below
Sorting:
- Password spraying tool and Bloodhound integration☆234Updated 5 months ago
- A python script to dump files and folders remotely from a Windows SMB share.☆224Updated 4 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆302Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆146Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 10 months ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆110Updated last year
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆166Updated 2 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆96Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆72Updated 9 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆186Updated 9 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆91Updated last month
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆139Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆99Updated 3 years ago
- ☆166Updated last month
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆306Updated 6 months ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆154Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 3 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆73Updated last year
- ☆190Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆129Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆96Updated 3 years ago
- ☆299Updated 2 months ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests…☆271Updated this week
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆90Updated 11 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆131Updated last year