hackedbyagirl / offensive-kali-ansible
Ansible playbook to automate environmental setup for internal and external penetration testing
☆25Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for offensive-kali-ansible
- Automate the build of a vulnerable AD environment.☆33Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Ease and assist the compromise of an Active Directory environment.☆27Updated 3 years ago
- Password list generator for password spraying - prebaked with goodies☆94Updated last year
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆34Updated 4 months ago
- Modular Enumeration and Password Spraying Framework☆109Updated 7 months ago
- ☆133Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆106Updated 5 months ago
- Small python script wrapper for automating hashcat commands☆34Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆82Updated 5 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 3 months ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆14Updated last year
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- Ransomware Simulator for testing Blue Team Detections☆35Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆25Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆73Updated last week
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆72Updated 2 years ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆98Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- ☆76Updated 4 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆68Updated last year
- InfoSec Notes☆53Updated 7 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆43Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- ☆31Updated 4 months ago