cheetz / thp2
thp2 setup
☆261Updated 5 years ago
Alternatives and similar repositories for thp2:
Users that are interested in thp2 are comparing it to the libraries listed below
- ☆210Updated 6 years ago
- PowerShell Helper Tool☆151Updated 10 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- A web scraper for generating password files based on plain text found☆130Updated last year
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 6 years ago
- Notes of my OSCP study plan☆459Updated 2 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆315Updated 6 years ago
- ☆256Updated 7 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- PwnWiki - The notes section of the pentesters mind.☆562Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,008Updated 6 years ago
- Plugins for Metasploit Framework☆449Updated 6 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- ☆510Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Updated 7 years ago
- Personal Collection of Operating Systems Scripts☆562Updated 11 months ago
- Created by Jin Qian via the GitHub Connector☆434Updated last year
- Lair is a reactive attack collaboration framework and web application built with meteor.☆382Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆504Updated 4 years ago
- ☆638Updated 6 months ago
- Powershell C2 Server and Implants☆573Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 8 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆900Updated 4 years ago
- Post Exploitation Wiki☆518Updated 5 years ago
- Scripts that are useful for me on pen tests☆528Updated 2 years ago
- ☆425Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- The Hacker Playbook 3 - Web Commands☆83Updated 6 years ago