ThePorgs / Exegol-images
Docker images of the Exegol project
☆97Updated 3 weeks ago
Alternatives and similar repositories for Exegol-images:
Users that are interested in Exegol-images are comparing it to the libraries listed below
- Lab used for workshop and CTF☆172Updated last week
- Assess the security of your Active Directory with few or all privileges.☆260Updated last week
- ☆88Updated this week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆145Updated this week
- winPEAS, but for Active Directory☆144Updated 2 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆88Updated 3 months ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆124Updated 3 months ago
- Hacking resources for the Exegol project☆31Updated 2 weeks ago
- ☆139Updated 2 months ago
- Speed up your pentest enumeration☆82Updated last month
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆306Updated 2 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆391Updated 2 weeks ago
- Azure mindmap for penetration tests☆175Updated last year
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆96Updated this week
- In-depth ldap enumeration utility☆452Updated this week
- Automated Active Directory Enumeration☆433Updated 3 weeks ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆86Updated this week
- Some scripts to abuse kerberos using Powershell☆327Updated last year
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆110Updated last year
- Make everyone in your VLAN ASRep roastable☆177Updated this week
- An ADCS honeypot to catch attackers in your internal network.☆278Updated 7 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆145Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆113Updated last year
- ☆173Updated 2 months ago
- Tuoni☆79Updated this week
- Identify the accounts most vulnerable to dictionary attacks☆108Updated 6 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆174Updated 6 months ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆145Updated 2 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆138Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆513Updated 3 months ago