awsmhacks / CrackMapExtreme
For all your network pentesting needs
☆154Updated 10 months ago
Alternatives and similar repositories for CrackMapExtreme:
Users that are interested in CrackMapExtreme are comparing it to the libraries listed below
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Various Cheat Sheets☆181Updated 3 years ago
- locate and attack Lync/Skype for Business☆337Updated 7 months ago
- Domain user enumeration tool☆215Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated 10 months ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆193Updated 10 months ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 4 years ago
- Phishing Template Generation Made Easy☆164Updated 7 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Responsive Command and Control System☆104Updated 2 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆183Updated 5 years ago
- SMB Relay Attack Script☆149Updated 6 years ago
- Rapid Attack Infrastructure (RAI)☆304Updated 5 months ago
- Repo with various Red Team scripts☆145Updated 4 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆304Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆387Updated 6 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆316Updated 5 years ago
- ☆272Updated 2 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago