grahamhelton / dredgeLinks
Dredging up secrets from the depths of the file system
☆131Updated 11 months ago
Alternatives and similar repositories for dredge
Users that are interested in dredge are comparing it to the libraries listed below
Sorting:
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 5 months ago
- ☆190Updated 5 months ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 4 months ago
- Azure mindmap for penetration tests☆188Updated last year
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Find CVEs associated to Linux and public exploits on github☆119Updated 5 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆195Updated 11 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 7 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆223Updated 9 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- ☆41Updated last year
- ☆105Updated 2 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 8 months ago
- ☆171Updated 5 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆131Updated 2 weeks ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆42Updated last month
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆219Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 3 months ago
- ☆241Updated 8 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated last month
- Nuclei templates for honeypots detection.☆196Updated last year
- ☆52Updated last week
- OWASP Foundation web repository☆39Updated 7 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆212Updated 6 months ago
- List of tools and resources for pentesting Microsoft Active Directory☆100Updated 3 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year