deFr0ggy / PMAT-Labs-WalkthroughsLinks
Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.
☆43Updated 3 years ago
Alternatives and similar repositories for PMAT-Labs-Walkthroughs
Users that are interested in PMAT-Labs-Walkthroughs are comparing it to the libraries listed below
Sorting:
- ☆42Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- ☆64Updated 4 years ago
- ☆80Updated 5 years ago
- Commands used in Windows penetration tests☆54Updated 3 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 4 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- ☆33Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated 2 weeks ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆34Updated 2 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 3 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 3 years ago
- Automate the build of a vulnerable AD environment.☆37Updated 3 years ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- ☆38Updated 3 years ago
- ☆16Updated 4 years ago
- ☆24Updated 6 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago