blackhatethicalhacking / red_team_tool_countermeasures
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for red_team_tool_countermeasures
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Scripts and One-Liners☆19Updated 2 weeks ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆18Updated 5 years ago
- The New Hacking Framework☆18Updated 7 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Automated Penetration Testing Framework☆35Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆13Updated 4 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Updated 11 months ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- ☆24Updated 4 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆30Updated 6 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 4 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- LinkedIn reconnaissance tool☆11Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆14Updated 5 years ago
- ☆34Updated 6 years ago
- ☆14Updated 4 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago