crypt0rr / kb
kb=$(cat sillynotes.txt)
☆35Updated 2 weeks ago
Alternatives and similar repositories for kb:
Users that are interested in kb are comparing it to the libraries listed below
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Field guide to gather low-hanging fruits☆13Updated 2 weeks ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- InfoSec Notes☆56Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆33Updated last week
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆10Updated last year
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Resources for AD penetration testing and security☆30Updated 3 years ago
- ☆37Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated 11 months ago
- Custom pentesting tools☆25Updated 4 years ago
- ☆19Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- ☆27Updated 6 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 8 months ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago