cisagov / pen-testing-findings
A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
☆244Updated 2 years ago
Alternatives and similar repositories for pen-testing-findings
Users that are interested in pen-testing-findings are comparing it to the libraries listed below
Sorting:
- ☆239Updated 3 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆212Updated 5 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆330Updated 2 months ago
- An open-source self-hosted purple team management web application.☆269Updated this week
- A OWASP Based Checklist With 80+ Test Cases☆142Updated 2 years ago
- Find CVEs associated to Linux and public exploits on github☆117Updated last month
- ☆173Updated 2 years ago
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- CSbyGB PenTips Gitbook☆110Updated 2 months ago
- Halberd : Multi-Cloud Attack Tool☆273Updated last week
- ☆66Updated 3 years ago
- AD Lab Setup Scripts☆69Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- This Repo serves as a collection of shared security and penetration testing resources for the cloud.☆267Updated 9 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆245Updated last month
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆118Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 6 months ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- ☆138Updated 3 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆186Updated 2 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 10 months ago
- ☆486Updated last year
- ☆266Updated last year
- Pwnspoof repository☆261Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆384Updated 6 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Websec interview questions by tib3rius answered☆308Updated last year
- BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfi…☆455Updated last month