lutzenfried / Methodology
☆413Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for Methodology
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆429Updated last week
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 3 months ago
- Compiled tools for internal assessments☆253Updated last week
- A RedTeam Toolkit☆385Updated last month
- Pentest Report Generator☆377Updated 2 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆383Updated 4 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆509Updated last month
- ☆248Updated last year
- Tips on how to write exploit scripts (faster!)☆422Updated 4 months ago
- Script for generating revshells☆454Updated 2 months ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆182Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆316Updated 3 weeks ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆702Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆585Updated 5 months ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆191Updated 4 months ago
- Red Team Attack Lab for TTP testing & research☆560Updated last year
- Active Directory pentesting mind map☆301Updated last year
- A library for detecting known secrets across many web frameworks☆524Updated this week
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆655Updated 9 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆187Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆291Updated last year
- Automated Active Directory Enumeration☆415Updated this week
- Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers☆374Updated last month
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆301Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆452Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 4 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆516Updated 9 months ago
- ☆150Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆654Updated 7 months ago