hakluke / Internal-Pentest-Playbook
Internal Network Penetration Test Playbook
☆19Updated 3 years ago
Alternatives and similar repositories for Internal-Pentest-Playbook:
Users that are interested in Internal-Pentest-Playbook are comparing it to the libraries listed below
- Tools used for Pentesting☆22Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 11 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Simple username generator based on a list of name and surname☆12Updated 3 years ago
- ☆29Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated last year
- ☆34Updated last year
- ☆24Updated 5 years ago
- Field guide to gather low-hanging fruits☆13Updated last year
- ☆19Updated last year
- ☆42Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- A Red Teaming tool focused on profiling the target.☆26Updated 9 months ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 9 months ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Windows priviledge escalation script☆13Updated last month
- A simple pentest container equipped with common python pentest tools.☆41Updated last month
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 5 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆14Updated 10 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated 11 months ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- aws cli pentesting/red team snippets☆32Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A collection of one off hacks and simple scripts☆28Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago