d4rckh / gorilla
tool for generating wordlists or extending an existing one using mutations.
β383Updated last year
Alternatives and similar repositories for gorilla:
Users that are interested in gorilla are comparing it to the libraries listed below
- Active Directory data ingestor for BloodHound Legacy written in Rust. π¦β976Updated 3 months ago
- Identify privilege escalation paths within and across different cloudsβ680Updated 3 months ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaboratorβ169Updated 3 years ago
- β419Updated 5 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkitβ430Updated last year
- β288Updated last year
- β377Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli β¦β387Updated 3 weeks ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)β319Updated 3 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.β388Updated last month
- AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find aβ¦β375Updated 9 months ago
- a tool to help operate in EDRs' blind spotsβ698Updated 2 months ago
- A compact guide to network pivoting for penetration testings / CTF challenges.β195Updated 6 months ago
- Just an AV slayer. Nothing special ;)β213Updated 2 years ago
- Redeye is a tool intended to help you manage your data during a pentest operationβ464Updated 5 months ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but stillβ¦β410Updated last week
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.comβ105Updated 2 years ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.β783Updated 10 months ago
- Active Directory Labs/exams Reviewβ251Updated 3 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etcβ287Updated 6 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cβ¦β1,022Updated 3 months ago
- Course repository for PowerShell for Pentesters Courseβ427Updated 2 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Aβ¦β470Updated last year
- Hide your payload in DNSβ611Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.β486Updated 2 years ago
- Pentest Report Generatorβ393Updated this week
- A fast tool to scan client-side prototype pollution vulnerability written in Rust. π¦β602Updated last year
- β698Updated last week
- A RedTeam Toolkitβ394Updated 3 months ago
- Kubernetes exploitation toolβ361Updated 6 months ago