idchoppers / redTeaming
Assorted scripts I made for Red Teaming / Pen Testing
☆13Updated 10 months ago
Alternatives and similar repositories for redTeaming:
Users that are interested in redTeaming are comparing it to the libraries listed below
- Some Cheat Sheet for Red Team☆16Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆32Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- ☆24Updated 6 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- ☆14Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated last year
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- New Framework Red Team Operations☆18Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Field guide to gather low-hanging fruits☆13Updated last month
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- A network logging tool that logs per process activities☆32Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- ☆12Updated 2 years ago
- ☆28Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆18Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- Resources for AD penetration testing and security☆30Updated 3 years ago
- ☆15Updated last year