Tib3rius / creddump7
☆29Updated 4 years ago
Alternatives and similar repositories for creddump7:
Users that are interested in creddump7 are comparing it to the libraries listed below
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated 10 months ago
- ☆81Updated 5 years ago
- ☆48Updated 10 months ago
- ☆29Updated 5 years ago
- ☆35Updated 3 years ago
- ☆66Updated 3 years ago
- Notes for CRTP☆40Updated 4 years ago
- Abertay CMP202 Project☆34Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- This is to reorganize my notes☆10Updated 3 years ago
- OSCP notes☆53Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Preparation for OSWE☆42Updated 5 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 3 months ago
- Aspx reverse shell☆106Updated 5 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- OSWE Preparation☆37Updated 5 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆96Updated 3 years ago
- ☆31Updated 4 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆43Updated 5 months ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- You don't need wires to be connected☆40Updated 5 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆29Updated 6 years ago