lefayjey / PentestToolsLinks
☆41Updated this week
Alternatives and similar repositories for PentestTools
Users that are interested in PentestTools are comparing it to the libraries listed below
Sorting:
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- Windows Privilege Escalation☆69Updated 3 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- ☆25Updated 3 years ago
- Duplicate not owned Token from Running Process☆72Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 8 months ago
- ☆44Updated 2 months ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- ☆59Updated 10 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 10 months ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- PowerShell Reverse Shell☆79Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- A little cheatsheet for NetExec☆27Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Dump Windows SAM hashes☆42Updated 2 years ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 8 months ago
- Automated exploitation of MSSQL servers at scale☆120Updated this week
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago
- List of some AD tools I frequently use☆48Updated 4 months ago
- ☆44Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- Tool for efficient directory enumeration☆65Updated 11 months ago