alt3kx / alt3kx.github.ioLinks
☆12Updated last month
Alternatives and similar repositories for alt3kx.github.io
Users that are interested in alt3kx.github.io are comparing it to the libraries listed below
Sorting:
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- A collection of red blue team staff☆48Updated 2 years ago
- ☆20Updated 4 years ago
- Attack Surface Discovery Tool☆110Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆44Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated 2 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- ☆37Updated 2 years ago
- ☆29Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- ☆42Updated 3 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆26Updated this week
- Active DIrectory Lab for Pentesting Practice☆24Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- ☆50Updated 5 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- OSCP Study Guide☆42Updated 3 years ago
- ☆46Updated 3 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago