cliffe / SecGenLinks
Create randomly insecure VMs
☆2,702Updated last week
Alternatives and similar repositories for SecGen
Users that are interested in SecGen are comparing it to the libraries listed below
Sorting:
- Wiki to collect Red Team infrastructure hardening resources☆4,351Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,382Updated 11 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,752Updated 5 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,819Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,709Updated last month
- Post Exploitation Collection☆1,566Updated 5 years ago
- A Game of Hackers (CTF Scoreboard & Game Manager)☆1,034Updated last month
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,858Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,175Updated 2 years ago
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,638Updated 2 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,741Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,834Updated last year
- ✍️ A curated list of CVE PoCs.☆3,438Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,866Updated last year
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,215Updated 7 months ago
- A tool to dump the login password from the current linux user☆4,009Updated 2 weeks ago
- Linux Exploit Suggester; based on operating system release number☆1,802Updated 11 years ago
- Command line utility for searching and downloading exploits☆1,782Updated last week
- Pop shells like a master.☆1,473Updated 6 years ago
- NSE script based on Vulners.com API☆3,335Updated 4 months ago
- CTF Field Guide☆1,379Updated 10 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,570Updated 11 months ago
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,341Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,586Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,007Updated 6 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,071Updated 4 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,102Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,109Updated 2 years ago
- Writeups for HacktheBox 'boot2root' machines☆1,985Updated 2 years ago
- offsec batteries included☆1,578Updated last year