jakedmurphy1 / GoogleBITBLinks
☆31Updated 3 years ago
Alternatives and similar repositories for GoogleBITB
Users that are interested in GoogleBITB are comparing it to the libraries listed below
Sorting:
- MayorSec DNS Enumeration Tool☆87Updated 7 months ago
- ☆30Updated 2 years ago
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆55Updated last year
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆210Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated 11 months ago
- ☆65Updated 2 years ago
- ☆64Updated 4 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆36Updated 3 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 6 months ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- Active Directory Cheat Sheet☆143Updated 4 years ago
- ☆36Updated 3 years ago
- ☆64Updated 4 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- ☆119Updated 2 years ago
- Miscellaneous scripts for pentesting☆219Updated 7 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆97Updated 3 years ago
- List of Command&Control (C2) software☆41Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- a map for the azure oriented pentests☆67Updated 2 years ago