blackhatethicalhacking / red_team_tool_countermeasuresLinks
☆12Updated 4 years ago
Alternatives and similar repositories for red_team_tool_countermeasures
Users that are interested in red_team_tool_countermeasures are comparing it to the libraries listed below
Sorting:
- Extract credentials from lsass remotely☆16Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Scripts and One-Liners☆22Updated 4 months ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- ☆24Updated 5 years ago
- A tool to abuse Exchange services☆18Updated 6 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆18Updated 6 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Custom pentesting tools☆25Updated 4 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆11Updated 5 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆16Updated 5 years ago
- ☆24Updated 6 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- Wireless Pentesting Device☆22Updated 4 years ago