ihebski / DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password π‘οΈ
β5,542Updated 2 months ago
Related projects: β
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β5,595Updated last week
- Gather and update all available and newest CVEs with their PoC.β6,445Updated this week
- Arsenal is just a quick inventory and launcher for hacking programsβ3,154Updated last month
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β2,933Updated 2 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,080Updated 3 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β6,921Updated this week
- Adversary Emulation Frameworkβ8,239Updated this week
- A fast, simple, recursive content discovery tool written in Rust.β5,790Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β15,744Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β8,959Updated 2 weeks ago
- Fast passive subdomain enumeration tool.β9,963Updated this week
- The all-in-one browser extension for offensive security professionals πβ5,736Updated last month
- Fast web fuzzer written in Goβ12,270Updated 2 months ago
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β6,402Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β5,447Updated this week
- An OOB interaction gathering server and client libraryβ3,319Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β3,983Updated last month
- Monitor linux processes without root permissionsβ4,854Updated last year
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β7,380Updated this week
- A swiss army knife for pentesting networksβ8,355Updated 9 months ago
- A recursive internet scanner for hackers.β4,459Updated this week
- A collection of custom security tools for quick needs.β3,117Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ10,628Updated 3 weeks ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Sβ¦β2,546Updated last year
- Red Teaming Tactics and Techniquesβ3,979Updated 3 weeks ago
- In-depth attack surface mapping and asset discoveryβ11,798Updated this week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β8,776Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β5,340Updated last week
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ5,282Updated last month
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ3,812Updated 3 weeks ago