Scripts for Deploying new server
☆49Apr 26, 2025Updated 10 months ago
Alternatives and similar repositories for AttackDeploy
Users that are interested in AttackDeploy are comparing it to the libraries listed below
Sorting:
- ☆15May 17, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Various Tools and Docker Images☆280Apr 26, 2025Updated 10 months ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆49Sep 3, 2017Updated 8 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆416May 18, 2020Updated 5 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Apr 26, 2025Updated 10 months ago
- PoC for an adaptive parallelised DNS prober☆109Oct 4, 2022Updated 3 years ago
- ☆37Sep 12, 2018Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆93Jun 19, 2015Updated 10 years ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- Burp extension to passively scan for applications revealing software version numbers☆33May 30, 2024Updated last year
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Automated Subnet Scanner☆26Feb 25, 2025Updated last year
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆217Oct 12, 2024Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 2 months ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- Cross Site Scripting Payloads -- Variations☆72Apr 26, 2025Updated 10 months ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago