deeexcee-io / AI-Report-Assistant
Harness the Power of AI for all your reporting needs.
☆28Updated last year
Related projects ⓘ
Alternatives and complementary repositories for AI-Report-Assistant
- ☆62Updated last year
- Automate Scoping, OSINT and Recon assessments.☆92Updated 2 months ago
- ☆29Updated 3 years ago
- ☆21Updated 11 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆93Updated last year
- Red Teaming tools and techniques☆47Updated last year
- Mind Maps for penetration testing☆17Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆68Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 11 months ago
- My Favorite Offensive Security Scripts☆62Updated last year
- ☆32Updated 3 years ago
- a map for the azure oriented pentests☆65Updated last year
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated 3 weeks ago
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- Powershell tools used for Red Team / Pentesting.☆74Updated 10 months ago
- Challenge Python☆19Updated last year
- ☆26Updated last year
- ☆34Updated last year
- Network penetration testing toolset wrapper☆80Updated 2 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆23Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- List of Command&Control (C2) software☆34Updated 2 years ago
- ☆40Updated 2 weeks ago
- A simple pentest container equipped with common python pentest tools.☆41Updated last week
- ☆16Updated 6 months ago
- A collection of red blue team staff☆45Updated last year