daniellowrie / pwner
Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs
☆11Updated 4 years ago
Alternatives and similar repositories for pwner:
Users that are interested in pwner are comparing it to the libraries listed below
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated last year
- ☆64Updated last year
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Deny list generator for password filters☆25Updated 7 months ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- MayorSec DNS Enumeration Tool☆85Updated 3 months ago
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- ☆34Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆27Updated last year
- ☆63Updated 3 years ago
- ☆46Updated 3 months ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- list of useful commands, shells and notes related to OSCP☆24Updated 7 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- ☆41Updated 2 years ago
- List of tools and resources for pentesting Microsoft Active Directory☆45Updated 2 weeks ago
- Mind Maps for penetration testing☆19Updated 4 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- list of useful commands, shells and notes related to OSCP☆77Updated 7 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆34Updated 2 months ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆58Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆32Updated this week