lefayjey / PentestTools
☆38Updated 3 weeks ago
Alternatives and similar repositories for PentestTools:
Users that are interested in PentestTools are comparing it to the libraries listed below
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- My Favorite Offensive Security Scripts☆69Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆53Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆41Updated 2 years ago
- ☆22Updated 3 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆72Updated last year
- ☆26Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- ☆47Updated 2 years ago
- ☆51Updated 3 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆110Updated 3 years ago
- Windows Privilege Escalation☆56Updated 2 years ago
- Tool for efficient directory enumeration☆55Updated 5 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- ☆52Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- A small red team course☆36Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆51Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆100Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆48Updated 3 years ago
- ☆54Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year