azmatt / windowsEnumLinks
Batch file to help automate Windows enumeration for privilege escalation
☆89Updated 8 years ago
Alternatives and similar repositories for windowsEnum
Users that are interested in windowsEnum are comparing it to the libraries listed below
Sorting:
- 3 tools that work together to simplify reconaissance of Windows File Shares☆168Updated 7 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- ☆52Updated 4 years ago
- Various Cheat Sheets☆181Updated 4 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- pwk notes and scripts☆15Updated 10 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 6 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- Meterpreter Scripts that I'm working on☆172Updated 6 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Obfuscated Penetration Testing PowerShell scripts☆148Updated 8 months ago
- For all your network pentesting needs☆156Updated last year
- Responsive Command and Control System☆104Updated 2 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆134Updated 3 years ago
- Misc. PowerShell scripts☆118Updated 9 years ago
- Penetration testing scripts☆143Updated 7 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆230Updated 7 years ago
- ☆26Updated 8 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Professionally Evil Web Application Penetration Testing 101☆143Updated 5 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Updated 5 years ago
- ☆26Updated 7 years ago