Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using different approaches.
☆25May 6, 2024Updated last year
Alternatives and similar repositories for pivoting-tunneling-lab
Users that are interested in pivoting-tunneling-lab are comparing it to the libraries listed below
Sorting:
- An immersive, multi-container environment designed to practice network pivoting and lateral movement techniques.☆47Updated this week
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆17Dec 15, 2025Updated 2 months ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- ☆10Aug 4, 2020Updated 5 years ago
- Developed a Software that detects students face and then marks attendance after training face recognizer☆10Apr 30, 2018Updated 7 years ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆46Updated this week
- A collection of solutions and other inspiring material to Dennis Andriesse's 'Practical Binary Analysis' book.☆35Sep 16, 2021Updated 4 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆179May 28, 2025Updated 9 months ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- ☆12Oct 9, 2022Updated 3 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆10Mar 24, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 5 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- list of resource about low level dev☆18Nov 15, 2025Updated 3 months ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Extract most frequent words in a list of subdomains☆12Feb 15, 2025Updated last year
- ☆13Jun 15, 2023Updated 2 years ago