Pentester Academy notes and commands from the CRTP/CRTE/PACES courses
☆15Apr 29, 2022Updated 3 years ago
Alternatives and similar repositories for PowershellActiveDirectoryAbuse
Users that are interested in PowershellActiveDirectoryAbuse are comparing it to the libraries listed below
Sorting:
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Nov 13, 2025Updated 3 months ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Notes for CRTP☆42Dec 18, 2020Updated 5 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆12May 23, 2024Updated last year
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- ☆40Jan 12, 2022Updated 4 years ago
- ☆27Mar 6, 2025Updated last year
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Dec 15, 2025Updated 2 months ago
- 互联网数字垃圾回收专用废纸篓☆24Mar 8, 2024Updated last year
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated last month
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆240Dec 4, 2022Updated 3 years ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- ☆10Feb 27, 2026Updated last week
- BayesML: your first library for Bayesian machine learning☆19Jan 27, 2026Updated last month
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Monitoring the Cloud Landscape☆92Feb 26, 2026Updated last week
- A Java version of the automatic program repair described by RSRepair and GenProg.☆11Jan 6, 2016Updated 10 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Goal Go Red-Team 工具类☆44Jan 15, 2025Updated last year
- offensive notes & resources☆43Apr 7, 2025Updated 10 months ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Jun 14, 2024Updated last year
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- RDP over WebSocket | WebRTC☆12Nov 8, 2021Updated 4 years ago
- ☆18Sep 9, 2025Updated 5 months ago