grahamhelton / dredgeLinks
Dredging up secrets from the depths of the file system
☆131Updated 10 months ago
Alternatives and similar repositories for dredge
Users that are interested in dredge are comparing it to the libraries listed below
Sorting:
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- Cloud subdomains identification tool☆60Updated 4 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Azure mindmap for penetration tests☆188Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 3 months ago
- ☆190Updated 4 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆41Updated last month
- ☆41Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆128Updated 7 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆191Updated 10 months ago
- ☆171Updated 5 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 6 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 3 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆224Updated 9 months ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 5 months ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆210Updated 5 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆198Updated last year
- ☆104Updated 2 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- ☆241Updated 7 months ago
- ☆37Updated last month
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- OWASP Foundation web repository☆39Updated 7 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- ☆55Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated last month
- List of tools and resources for pentesting Microsoft Active Directory☆97Updated 2 months ago