cliffe / SecGen
Create randomly insecure VMs
☆2,664Updated this week
Alternatives and similar repositories for SecGen:
Users that are interested in SecGen are comparing it to the libraries listed below
- Wiki to collect Red Team infrastructure hardening resources☆4,228Updated 11 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,558Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,698Updated last month
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,044Updated 10 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,617Updated 4 years ago
- A swiss army knife for pentesting networks☆8,617Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,042Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,795Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,347Updated 3 weeks ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,148Updated 2 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,235Updated 5 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,541Updated last year
- The ultimate WinRM shell for hacking/pentesting☆4,749Updated 3 months ago
- CTF framework and exploit development library☆12,397Updated last week
- Monitor linux processes without root permissions☆5,258Updated 2 years ago
- Automated Adversary Emulation Platform☆5,927Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,234Updated last year
- Windows Exploit Suggester - Next Generation☆4,344Updated last week
- A tool to dump the login password from the current linux user☆3,911Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,540Updated 4 months ago
- Post Exploitation Collection☆1,559Updated 4 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,503Updated last month
- ☆3,535Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,300Updated this week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,429Updated last month
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,701Updated 8 months ago
- Linux Exploit Suggester; based on operating system release number☆1,783Updated 10 years ago
- Linux privilege escalation auditing tool☆5,834Updated last year
- Six Degrees of Domain Admin☆10,077Updated this week
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,655Updated 9 months ago