lefayjey / PentestTools
☆37Updated 2 months ago
Alternatives and similar repositories for PentestTools:
Users that are interested in PentestTools are comparing it to the libraries listed below
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- ☆26Updated last year
- ☆47Updated 2 years ago
- My Favorite Offensive Security Scripts☆66Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- ☆25Updated last year
- ☆54Updated 3 months ago
- ☆28Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- A small red team course☆35Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆53Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆42Updated 8 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 5 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 2 weeks ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- ☆52Updated last year
- ☆22Updated 2 years ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆108Updated 3 years ago
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- ☆29Updated last year