jakedmurphy1 / log4jakeLinks
☆16Updated 3 years ago
Alternatives and similar repositories for log4jake
Users that are interested in log4jake are comparing it to the libraries listed below
Sorting:
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- ☆42Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆96Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- Notes for CRTP☆42Updated 4 years ago
- Next generation fireprox AWS API endpoint creation utility.☆54Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- ☆38Updated 3 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆75Updated 6 months ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- a map for the azure oriented pentests☆67Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 9 months ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆99Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 10 months ago
- ☆37Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated last year
- offensive notes & resources☆43Updated 7 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Azure Service Subdomain Enumeration☆67Updated last year
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- Browser extension that extracts users from LinkedIn company pages☆162Updated 2 years ago