jakedmurphy1 / GoogleBITBLinks
☆31Updated 3 years ago
Alternatives and similar repositories for GoogleBITB
Users that are interested in GoogleBITB are comparing it to the libraries listed below
Sorting:
- MayorSec DNS Enumeration Tool☆87Updated 8 months ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆30Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆209Updated 2 years ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- ☆55Updated last year
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- ☆64Updated 4 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- ☆36Updated this week
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆97Updated 3 years ago
- ☆34Updated 2 years ago
- ☆119Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 6 months ago
- Azure Service Subdomain Enumeration☆64Updated 11 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆53Updated 2 years ago
- ☆114Updated 4 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- ☆65Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆41Updated 2 years ago
- List of Command&Control (C2) software☆42Updated 2 years ago