a6avind / spoofcheck
Spoofcheck
☆22Updated this week
Related projects: ⓘ
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆35Updated last month
- A Python based ingestor for BloodHound☆81Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆34Updated last year
- ☆15Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆129Updated 11 months ago
- ☆139Updated 6 months ago
- User enumeration and password spraying tool for testing Azure AD☆67Updated 2 years ago
- C2 Automation using Linode☆78Updated last year
- Automated exploitation of MSSQL servers at scale☆79Updated this week
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆85Updated 10 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆64Updated 6 months ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆60Updated 8 months ago
- ☆110Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆23Updated 10 months ago
- PowerShell Reverse Shell☆60Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆186Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆39Updated 3 months ago
- Impacket is a collection of Python classes for working with network protocols.☆66Updated last month
- ☆95Updated 2 years ago
- ☆31Updated 2 years ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆0Updated 3 months ago
- Make everyone in your VLAN ASRep roastable☆114Updated 3 months ago
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- ☆64Updated 4 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆82Updated last year
- ☆26Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆85Updated 3 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆67Updated 3 months ago
- ☆41Updated 2 years ago