TiiZss / BreakingLabLinks
Bash script to manage insecure web apps using docker and hosts aliases for pentest practice
☆36Updated last week
Alternatives and similar repositories for BreakingLab
Users that are interested in BreakingLab are comparing it to the libraries listed below
Sorting:
- ☆25Updated 3 years ago
- ☆55Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- This is an AD pentest tools collection☆59Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 2 months ago
- ☆91Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆98Updated 2 months ago
- ☆65Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- ☆104Updated 3 months ago
- Challenge Python☆19Updated 2 years ago
- A real fake social engineering app☆129Updated 5 months ago
- Discovering Typo Squatting on your domains!☆79Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆21Updated 7 months ago
- ☆65Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆53Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- ☆54Updated this week
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆31Updated 3 weeks ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago