itm4n / Pentest-ToolsLinks
Some random tools I use for penetration testing
☆90Updated 3 months ago
Alternatives and similar repositories for Pentest-Tools
Users that are interested in Pentest-Tools are comparing it to the libraries listed below
Sorting:
- Password Spraying Framework☆63Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Phish password protected Excel-Files☆104Updated last year
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- C# tool to discover low hanging fruits☆94Updated 2 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆88Updated 3 years ago
- ☆95Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated last year
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆143Updated 3 years ago
- Remotely enables Restricted Admin Mode☆211Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last month
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- ☆131Updated 4 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- ☆80Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆85Updated 6 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆92Updated 3 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 4 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆158Updated 4 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆80Updated 4 years ago