Y3llowDuck / RDP-AutomationLinks
PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.
☆31Updated 6 months ago
Alternatives and similar repositories for RDP-Automation
Users that are interested in RDP-Automation are comparing it to the libraries listed below
Sorting:
- ☆22Updated last year
- Creating a Malicious Macro using MS Word☆23Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last week
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆20Updated 11 months ago
- Learning resources and external resources to help you prepare for your offsec certifications☆85Updated 9 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 3 months ago
- ☆38Updated 3 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆39Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆20Updated last year
- ☆43Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- ☆37Updated 3 years ago
- A list of all Active Directory machines from HackTheBox☆62Updated last week
- ☆86Updated 5 months ago
- ☆92Updated 2 years ago
- Exploit to dump ipmi hashes☆35Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆33Updated 3 months ago
- ☆23Updated last year
- ☆18Updated 10 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- ☆14Updated 9 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Everything and anything related to password spraying☆142Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆42Updated 3 weeks ago
- CLI monitor for windows process- & file activity☆89Updated 4 years ago
- ☆54Updated 6 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆49Updated 3 weeks ago