jakedmurphy1 / log4jakeLinks
☆16Updated 4 years ago
Alternatives and similar repositories for log4jake
Users that are interested in log4jake are comparing it to the libraries listed below
Sorting:
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- ☆42Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- a map for the azure oriented pentests☆70Updated 2 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Notes for CRTP☆42Updated 5 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆97Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- offensive notes & resources☆43Updated 9 months ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated last month
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆104Updated 2 years ago
- ☆37Updated 2 years ago
- Creates and sends fake meeting invite☆74Updated 4 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- ☆19Updated 3 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆25Updated last week
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Updated 4 years ago
- Enumerate and check domains for Azure tenants☆60Updated 3 years ago
- ☆73Updated 7 years ago
- ☆47Updated 3 years ago