cliffe / SecGenLinks
Create randomly insecure VMs
☆2,736Updated last month
Alternatives and similar repositories for SecGen
Users that are interested in SecGen are comparing it to the libraries listed below
Sorting:
- Wiki to collect Red Team infrastructure hardening resources☆4,432Updated 3 months ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,786Updated 6 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,820Updated 5 years ago
- NSE script based on Vulners.com API☆3,363Updated 4 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,277Updated this week
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,473Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,890Updated last year
- A Game of Hackers (CTF Scoreboard & Game Manager)☆1,079Updated 6 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,776Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,163Updated 2 years ago
- Post Exploitation Collection☆1,572Updated 5 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,808Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,270Updated last month
- A swiss army knife for pentesting networks☆9,036Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,611Updated last month
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,710Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,602Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,419Updated 3 months ago
- Network Infrastructure Penetration Testing Tool☆1,666Updated 4 years ago
- Linux privilege escalation auditing tool☆6,362Updated last year
- offsec batteries included☆1,591Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,183Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,891Updated 2 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,704Updated 4 months ago
- A curated list of awesome YARA rules, tools, and people.☆4,125Updated 10 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,795Updated 2 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,512Updated 3 months ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Updated last year
- Windows Exploit Suggester - Next Generation☆4,749Updated last week
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,694Updated 2 years ago