Miscellaneous scripts for pentesting
☆218Mar 22, 2018Updated 7 years ago
Alternatives and similar repositories for pentest-scripts
Users that are interested in pentest-scripts are comparing it to the libraries listed below
Sorting:
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Jan 30, 2026Updated last month
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- ☆413Dec 14, 2023Updated 2 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆550Jul 16, 2021Updated 4 years ago
- PowerShell Obfuscation and Data Science☆180May 4, 2022Updated 3 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,263Mar 19, 2025Updated 11 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆223May 19, 2022Updated 3 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,900Oct 29, 2025Updated 4 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆500Jan 23, 2023Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- Tools & Interesting Things for RedTeam Ops☆2,258Feb 10, 2026Updated 3 weeks ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Dec 7, 2025Updated 3 months ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,643Jul 27, 2025Updated 7 months ago
- ☆848Jan 12, 2026Updated last month
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,371Oct 22, 2025Updated 4 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆322Aug 8, 2024Updated last year
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- SMBeagle - Fileshare auditing tool.☆744Nov 4, 2025Updated 4 months ago
- ☆1,698Aug 19, 2022Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆106Jul 10, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆218Jan 18, 2023Updated 3 years ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆75Aug 17, 2020Updated 5 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆418Jan 27, 2024Updated 2 years ago
- Azure and AWS Attacks☆1,114Nov 25, 2022Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,465Nov 16, 2024Updated last year