ThePorgs / Exegol-resources
Hacking resources for the Exegol project
☆32Updated this week
Alternatives and similar repositories for Exegol-resources:
Users that are interested in Exegol-resources are comparing it to the libraries listed below
- InfoSec Notes☆56Updated last year
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- My Favorite Offensive Security Scripts☆70Updated last year
- ☆22Updated 3 years ago
- ☆59Updated last week
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Docker images of the Exegol project☆105Updated this week
- A little cheatsheet for NetExec☆22Updated 11 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆94Updated 11 months ago
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆63Updated 2 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆128Updated last year
- Most Responder's configuration power in your hand.☆47Updated 3 months ago
- PowerShell Reverse Shell☆61Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆113Updated 3 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- ☆108Updated 5 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- Bad scripts I made doing CTF's☆21Updated last year
- ☆83Updated 2 months ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆23Updated 3 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆17Updated 2 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 2 months ago
- Simple PoC in PowerShell for CVE-2023-23397☆40Updated 2 years ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆183Updated 8 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆43Updated 6 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Python setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆105Updated 5 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated 8 months ago