deFr0ggy / PMAT-Labs-WalkthroughsLinks
Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.
☆43Updated 3 years ago
Alternatives and similar repositories for PMAT-Labs-Walkthroughs
Users that are interested in PMAT-Labs-Walkthroughs are comparing it to the libraries listed below
Sorting:
- ☆40Updated 2 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- ☆64Updated 4 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- ☆79Updated 5 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 3 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆34Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- ☆46Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 3 years ago
- Automate the build of a vulnerable AD environment.☆37Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- A repo to support the book☆108Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- ☆24Updated 6 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- InfoSec Notes☆56Updated last year
- Talk slides and material☆32Updated last year
- ☆48Updated 6 months ago