jakedmurphy1 / log4jakeLinks
☆16Updated 3 years ago
Alternatives and similar repositories for log4jake
Users that are interested in log4jake are comparing it to the libraries listed below
Sorting:
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Notes for CRTP☆41Updated 4 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 8 months ago
- ☆38Updated 3 years ago
- ☆42Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ☆24Updated 6 years ago
- offensive notes & resources☆43Updated 5 months ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆68Updated last year
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆93Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- ☆27Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- ☆38Updated 2 years ago
- Enumerate and check domains for Azure tenants☆60Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- Fly into Gophish with One Click (Infra Automation)☆50Updated 2 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆74Updated 5 months ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆97Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 3 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago