cliffe / SecGenLinks
Create randomly insecure VMs
☆2,709Updated 3 weeks ago
Alternatives and similar repositories for SecGen
Users that are interested in SecGen are comparing it to the libraries listed below
Sorting:
- Wiki to collect Red Team infrastructure hardening resources☆4,373Updated last month
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,405Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,731Updated 3 months ago
- NSE script based on Vulners.com API☆3,349Updated last month
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,646Updated 2 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,101Updated 4 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,058Updated last month
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,174Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,778Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,657Updated 2 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,834Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,848Updated last year
- A Game of Hackers (CTF Scoreboard & Game Manager)☆1,055Updated 3 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,756Updated 2 weeks ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,486Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,134Updated 2 years ago
- ☆3,727Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,572Updated 2 weeks ago
- offsec batteries included☆1,576Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,716Updated 5 years ago
- A Tool for Domain Flyovers☆5,860Updated 3 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,755Updated last year
- Modern Honey Network☆2,468Updated 11 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,273Updated 8 months ago
- Automated Adversary Emulation Platform☆6,507Updated 2 weeks ago
- Linux privilege escalation auditing tool☆6,220Updated last year
- A curated list of awesome YARA rules, tools, and people.☆4,044Updated 7 months ago
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,352Updated 3 years ago
- Post Exploitation Collection☆1,567Updated 5 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,385Updated 3 weeks ago