csandker / PlaybooksLinks
☆36Updated 5 years ago
Alternatives and similar repositories for Playbooks
Users that are interested in Playbooks are comparing it to the libraries listed below
Sorting:
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- A parser to extract information from .nessus file format☆23Updated 4 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 6 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- another nmap summarising script☆26Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- ☆12Updated 8 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Miscellaneous for various things☆20Updated 6 months ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 6 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- ☆17Updated 6 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 11 months ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- Walking the PEB in VBA☆23Updated 5 years ago