horshark / akb-explorerLinks
A command line tool to search AttackerKB.
☆52Updated 4 years ago
Alternatives and similar repositories for akb-explorer
Users that are interested in akb-explorer are comparing it to the libraries listed below
Sorting:
- 👹☆57Updated 4 years ago
- BurpSuite using the document and some extensions☆71Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- ☆85Updated 5 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆24Updated 2 weeks ago
- A Linux enumeration script for Hack The Box☆191Updated 6 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 4 months ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆64Updated 6 years ago
- Parse .nessus file(s) and shows output in interactive UI☆161Updated 7 months ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆48Updated 10 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated 2 years ago
- Stuff I use for OSCP/HTB/VHL and so on.☆111Updated 5 years ago
- Showcase of DNS Exfiltration and Infiltration☆54Updated 4 years ago
- m0chan.github.io☆88Updated 2 months ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 4 years ago
- ☆67Updated 3 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆25Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 4 years ago
- ☆104Updated 6 years ago
- A python based blind SQL injection exploitation script☆141Updated 5 years ago
- OSWE Preparation☆37Updated 6 years ago
- Reverse Shell-able Windows exploits short POCs.☆33Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆63Updated 6 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- ☆165Updated 5 years ago