Audit Windows Security with best Practice
☆192Sep 25, 2024Updated last year
Alternatives and similar repositories for Wynis
Users that are interested in Wynis are comparing it to the libraries listed below
Sorting:
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆308Jul 4, 2023Updated 2 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- ATTPwn☆217Mar 9, 2024Updated 2 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Active Directory Lab for Penetration Testing☆54Jul 16, 2025Updated 7 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Feb 19, 2026Updated 2 weeks ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- Powershell script to do domain auditing automation☆403Feb 17, 2026Updated 3 weeks ago
- Red Team PowerShell Script☆336Jul 31, 2023Updated 2 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- Cross Origin Resource Sharing MisConfiguration Scanner☆172Nov 17, 2021Updated 4 years ago
- The Shadow Attack Framework☆1,115Sep 4, 2022Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated last year
- Automation for internal Windows Penetrationtest / AD-Security☆3,645Aug 28, 2025Updated 6 months ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- ☆1,674Apr 14, 2025Updated 10 months ago
- ☆538Nov 20, 2021Updated 4 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Collection of VBA macro published in our twitter / blog☆157Sep 5, 2022Updated 3 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆547Dec 8, 2023Updated 2 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆866Mar 20, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago