grahamhelton / dredgeLinks
Dredging up secrets from the depths of the file system
☆132Updated last year
Alternatives and similar repositories for dredge
Users that are interested in dredge are comparing it to the libraries listed below
Sorting:
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated 7 months ago
- Cloud subdomains identification tool☆61Updated 7 months ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 9 months ago
- ☆191Updated 7 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 6 months ago
- ☆40Updated last year
- Azure mindmap for penetration tests☆192Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- ☆174Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 10 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆203Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆43Updated 3 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Updated 5 months ago
- List of tools and resources for pentesting Microsoft Active Directory☆108Updated 5 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆223Updated 8 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆135Updated 2 weeks ago
- Labs & Code snippets for RRT on TTI☆40Updated 3 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆234Updated 11 months ago
- ☆116Updated 4 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆218Updated last year
- ☆40Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated 3 weeks ago
- Automated Active Directory lab running on Proxmox☆87Updated 3 months ago
- OWASP Foundation web repository☆40Updated this week
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆148Updated 4 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 10 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year