grahamhelton / dredgeLinks
Dredging up secrets from the depths of the file system
☆131Updated last year
Alternatives and similar repositories for dredge
Users that are interested in dredge are comparing it to the libraries listed below
Sorting:
- ☆194Updated 8 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated last month
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- Cloud subdomains identification tool☆63Updated 8 months ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 8 months ago
- ☆40Updated last year
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 7 months ago
- ☆173Updated 9 months ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Azure mindmap for penetration tests☆193Updated 2 years ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 11 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆205Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆227Updated 9 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆223Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 7 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆237Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- List of tools and resources for pentesting Microsoft Active Directory☆111Updated 6 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆47Updated 4 months ago
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆184Updated 2 weeks ago
- OWASP Foundation web repository☆44Updated 2 weeks ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated last year
- ☆41Updated last week
- Ping-based Information Lookup and Outbound Transfer☆80Updated last year
- ☆103Updated 3 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆139Updated last month
- ☆242Updated 11 months ago