ThePorgs / Exegol-imagesLinks
Docker images of the Exegol project
☆123Updated last week
Alternatives and similar repositories for Exegol-images
Users that are interested in Exegol-images are comparing it to the libraries listed below
Sorting:
- Lab used for workshop and CTF☆481Updated 3 weeks ago
- winPEAS, but for Active Directory☆171Updated 10 months ago
- GLPI vulnerabilities checking tool☆155Updated last month
- ☆100Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆156Updated 11 months ago
- ☆176Updated 9 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆102Updated 10 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆439Updated 4 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆653Updated 2 weeks ago
- ☆235Updated 8 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆398Updated 2 weeks ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆167Updated 7 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆145Updated 4 months ago
- A cheatsheet for NetExec☆186Updated 7 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆436Updated 2 weeks ago
- Assess the security of your Active Directory with few or all privileges.☆340Updated last week
- Azure mindmap for penetration tests☆194Updated 2 years ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆162Updated 2 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆142Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Updated 4 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆353Updated 3 weeks ago
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆417Updated 2 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆319Updated last week
- Make everyone in your VLAN ASRep roastable☆245Updated 3 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆387Updated last week
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Updated 6 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆226Updated 10 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆311Updated last month
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆258Updated 2 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆183Updated 2 years ago