d4rckh / im-a-sandbox
make your machine look like a sandbox/vm π€
β29Updated 2 years ago
Alternatives and similar repositories for im-a-sandbox:
Users that are interested in im-a-sandbox are comparing it to the libraries listed below
- All kinds of tiny shellsβ58Updated 2 years ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post messβ¦β48Updated 3 months ago
- A tool to dump exposed .git repositoriesβ54Updated 5 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.β93Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomaβ¦β53Updated last month
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.β43Updated last year
- Rebuild of portspoof in GO with additional features.β14Updated this week
- Wordlist to crack .zip-file passwordβ201Updated 2 years ago
- Nuke It From Orbit - remove AV/EDR with physical accessβ258Updated 4 months ago
- An Ansible role that runs Vulhub environments on a Linux system.β16Updated last year
- A list of awesome penetration testing tools and resources.β80Updated last year
- Crappy Golang code to list local listening ports and their associated processes.β30Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypassβ72Updated last year
- Hardened your Windows OS against forensics analysisβ21Updated 4 months ago
- β33Updated 4 months ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)β32Updated last year
- Lena's scripts/code/resources for malware analysisβ26Updated 10 months ago
- Tool designed to exfiltrate OneDrive Business OCR Dataβ109Updated 2 months ago
- My new C2 frameworkβ40Updated 2 years ago
- A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.β39Updated last year
- Bloodhound Portable for Windowsβ51Updated 2 years ago
- β40Updated 7 months ago
- Generate graphs and charts based on password cracking resultβ159Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β51Updated 4 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.β34Updated last year
- TLS & SNI aware netcatβ42Updated 5 months ago
- Leak NTLM via Website tab in teams via MS Officeβ78Updated last year
- Learn how to intercept flutter appsβ20Updated last year
- Create and enumerate hidden desktops.β90Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.β31Updated 2 years ago