cwolff411 / RedTeamVillage-SSHTunnelsLinks
Slides, documentation, and files from my presentation at Red Team Village for HackerOne's hacktivitycon.
☆36Updated 3 years ago
Alternatives and similar repositories for RedTeamVillage-SSHTunnels
Users that are interested in RedTeamVillage-SSHTunnels are comparing it to the libraries listed below
Sorting:
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆29Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆36Updated 3 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆106Updated 3 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆200Updated 2 months ago
- ☆119Updated 2 years ago
- ☆66Updated 3 years ago
- Password spraying tool and Bloodhound integration☆238Updated 6 months ago
- OSCP notes☆54Updated 4 years ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- A little utility to convert nmap xml results to markdown tables☆72Updated 3 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- OSCP Cheatsheets☆98Updated 5 years ago
- ☆99Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- An active directory laboratory for penetration testing.☆136Updated 4 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- ☆94Updated 2 years ago
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆402Updated 6 months ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Dumping LAPS from Python☆274Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Azure mindmap for penetration tests☆186Updated last year
- Windows for Red Teamers☆126Updated 3 years ago
- ☆82Updated 5 years ago