Tib3rius / AutoReconLinks
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
☆5,536Updated 3 weeks ago
Alternatives and similar repositories for AutoRecon
Users that are interested in AutoRecon are comparing it to the libraries listed below
Sorting:
- A script that you can run in the background!☆2,859Updated 10 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,631Updated last year
- The ultimate WinRM shell for hacking/pentesting☆4,891Updated 6 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,400Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,569Updated 10 months ago
- Linux privilege escalation auditing tool☆5,998Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,134Updated 3 months ago
- Monitor linux processes without root permissions☆5,472Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,636Updated 2 weeks ago
- 🎯 Command Injection Payload List☆3,342Updated 11 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,651Updated last week
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,438Updated 2 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆2,529Updated 4 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆3,789Updated last month
- Red Teaming Tactics and Techniques☆4,288Updated 9 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,434Updated last week
- Windows / Linux Local Privilege Escalation Workshop☆1,968Updated 2 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,637Updated 2 weeks ago
- Adversary Emulation Framework☆9,525Updated this week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,368Updated 2 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,330Updated 7 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,813Updated 3 years ago
- Windows Exploit Suggester - Next Generation☆4,487Updated last week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,328Updated 2 weeks ago
- List of Awesome Red Teaming Resources☆7,293Updated last year
- A swiss army knife for pentesting networks☆8,767Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,293Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,587Updated last month
- ☆2,455Updated 10 months ago
- Fancy reverse and bind shell handler☆2,757Updated 10 months ago