dxnboy / redteamLinks
☆44Updated 2 years ago
Alternatives and similar repositories for redteam
Users that are interested in redteam are comparing it to the libraries listed below
Sorting:
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 8 months ago
- Windows Privilege Escalation☆70Updated 3 years ago
- ☆38Updated 3 years ago
- ☆22Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 2 months ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- CLI monitor for windows process- & file activity☆90Updated 4 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆116Updated 2 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- ☆38Updated 4 years ago
- a map for the azure oriented pentests☆67Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆21Updated 11 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 8 months ago
- ☆92Updated 2 years ago
- ☆47Updated 3 years ago
- Exploit to dump ipmi hashes☆36Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆113Updated last month
- A webshell plugin and interactive shell for pentesting a WordPress website.☆93Updated 2 years ago
- A little cheatsheet for NetExec☆27Updated last year
- ☆91Updated 7 months ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆59Updated 2 years ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆39Updated 11 months ago