everythingBlackkk / Youtube_C2Links
☆12Updated 2 months ago
Alternatives and similar repositories for Youtube_C2
Users that are interested in Youtube_C2 are comparing it to the libraries listed below
Sorting:
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 5 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆41Updated last week
- Tools used for Pentesting☆22Updated 2 years ago
- Python Penetration Testing Tools☆17Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- ☆24Updated 6 years ago
- ☆31Updated 3 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- A not-curated list of cloud hacking labs☆25Updated last year
- Learning a little bit of DevOps and using Infrastructure-as-a-Code tools to automate the creation of the AD lab in TCM Security's course.☆9Updated 3 years ago
- ☆77Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 11 months ago
- ☆13Updated 11 months ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 7 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆18Updated 3 weeks ago
- Repo for preparing for OSCE but to learn more about exploit development☆12Updated 4 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- ☆43Updated 2 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- ☆21Updated 2 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 10 months ago