d4rckh / gorilla
tool for generating wordlists or extending an existing one using mutations.
β378Updated 11 months ago
Related projects: β
- Active Directory data collector for BloodHound written in Rust. π¦β909Updated last month
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkitβ420Updated 10 months ago
- Redeye is a tool intended to help you manage your data during a pentest operationβ461Updated 3 weeks ago
- Red Team Attack Lab for TTP testing & researchβ543Updated last year
- β472Updated this week
- Sandman is a NTP based backdoor for red team engagements in hardened networks.β766Updated 5 months ago
- β403Updated 3 weeks ago
- A RedTeam Toolkitβ377Updated 7 months ago
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rustβ321Updated 2 years ago
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highliβ¦β378Updated 2 months ago
- a tool to help operate in EDRs' blind spotsβ639Updated 5 months ago
- An Office365 User Attack Toolβ619Updated 6 months ago
- PowerShell Ransomware Simulator with C2 Serverβ456Updated 8 months ago
- A python tool to automate KeePass discovery and secret extraction.β443Updated 5 months ago
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find aβ¦β367Updated 4 months ago
- Nuclei templates for honeypots detection.β185Updated 10 months ago
- Tips on how to write exploit scripts (faster!)β397Updated 2 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etcβ269Updated last month
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.β475Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.β187Updated 2 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses withβ¦β285Updated last year
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaboratorβ169Updated 3 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.β550Updated 3 years ago
- β426Updated this week
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHoundβ402Updated 5 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.β384Updated 2 months ago
- Just an AV slayer. Nothing special ;)β211Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providersβ¦β515Updated 3 months ago
- A library for detecting known secrets across many web frameworksβ476Updated 3 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 usersβ601Updated 2 months ago