drk1wi / Shr3dKitLinks
Red Team Tool Kit
☆16Updated 6 years ago
Alternatives and similar repositories for Shr3dKit
Users that are interested in Shr3dKit are comparing it to the libraries listed below
Sorting:
- ☆33Updated 7 months ago
- Some scripts useful for red team activities☆13Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆15Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- ☆19Updated 8 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- ☆53Updated 4 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆19Updated 5 years ago
- ☆15Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆63Updated 6 years ago
- ☆20Updated 11 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Automation Hacking & Penetration Testing Suite☆11Updated 9 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆22Updated 7 years ago