cheetz / thp2Links
thp2 setup
☆260Updated 5 years ago
Alternatives and similar repositories for thp2
Users that are interested in thp2 are comparing it to the libraries listed below
Sorting:
- ☆209Updated 6 years ago
- ☆508Updated 7 years ago
- Notes of my OSCP study plan☆461Updated 2 years ago
- Personal Collection of Operating Systems Scripts☆562Updated last year
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 7 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- PowerShell Helper Tool☆151Updated 10 years ago
- ☆257Updated 7 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- ☆636Updated 8 months ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆315Updated 6 years ago
- Scripts that are useful for me on pen tests☆530Updated 2 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- SimplE RePort wrIting and COllaboration tool☆1,099Updated 5 years ago
- A web scraper for generating password files based on plain text found☆129Updated last year
- Post Exploitation Wiki☆521Updated 5 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 4 years ago
- Created by Jin Qian via the GitHub Connector☆434Updated last year
- Powershell C2 Server and Implants☆573Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,007Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆904Updated 4 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆577Updated 7 years ago
- Python and Powershell internal penetration testing framework☆720Updated 9 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Specify targets and run sets of tools against them☆389Updated 6 years ago