ihebski / DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈ
β6,002Updated last week
Alternatives and similar repositories for DefaultCreds-cheat-sheet:
Users that are interested in DefaultCreds-cheat-sheet are comparing it to the libraries listed below
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β5,965Updated last week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,370Updated 9 months ago
- A fast, simple, recursive content discovery tool written in Rust.β6,349Updated last week
- Monitor linux processes without root permissionsβ5,302Updated 2 years ago
- Fast web fuzzer written in Goβ13,652Updated 9 months ago
- Tools and Techniques for Red Team / Penetration Testingβ6,507Updated last week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,137Updated this week
- Fast passive subdomain enumeration tool.β11,380Updated last week
- Arsenal is just a quick inventory and launcher for hacking programsβ3,338Updated 4 months ago
- A Workflow Engine for Offensive Securityβ5,533Updated last month
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.β3,375Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.β5,225Updated 5 months ago
- Adversary Emulation Frameworkβ9,071Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,169Updated 6 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,261Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,406Updated last month
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ5,688Updated 7 months ago
- Windows Exploit Suggester - Next Generationβ4,365Updated this week
- A swiss army knife for pentesting networksβ8,643Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β5,728Updated 2 weeks ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,422Updated 5 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β9,398Updated 6 months ago
- The ultimate WinRM shell for hacking/pentestingβ4,775Updated 3 months ago
- In-depth attack surface mapping and asset discoveryβ12,669Updated this week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiβ¦β2,291Updated 3 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β17,149Updated last week
- Fancy reverse and bind shell handlerβ2,722Updated 7 months ago
- A Tool for Domain Flyoversβ5,735Updated 2 years ago
- File upload vulnerability scanner and exploitation tool.β3,181Updated last year
- The Network Execution Toolβ3,701Updated this week