mgeeky / Penetration-Testing-Tools
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
☆2,651Updated last year
Alternatives and similar repositories for Penetration-Testing-Tools:
Users that are interested in Penetration-Testing-Tools are comparing it to the libraries listed below
- Red Teaming & Pentesting checklists for various engagements☆2,524Updated 6 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,224Updated 10 months ago
- Red Teaming Tactics and Techniques☆4,173Updated 6 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,429Updated 3 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,538Updated 2 years ago
- ☆2,204Updated last year
- Tools & Interesting Things for RedTeam Ops☆2,169Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,758Updated 9 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,921Updated 4 months ago
- List of Awesome Red Teaming Resources☆7,088Updated last year
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,644Updated 5 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,736Updated 3 months ago
- A collaborative, multi-platform, red teaming framework☆3,447Updated this week
- A swiss army knife for pentesting networks☆8,608Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,398Updated last month
- A script that you can run in the background!☆2,802Updated 7 months ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,532Updated 3 months ago
- Privilege Escalation Enumeration Script for Windows☆3,121Updated this week
- File upload vulnerability scanner and exploitation tool.☆3,169Updated last year
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆2,503Updated 4 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,809Updated 6 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,070Updated 10 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,323Updated 6 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,316Updated 3 months ago
- List of Awesome Asset Discovery Resources☆2,044Updated last month
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,075Updated 2 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,283Updated 2 months ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,146Updated 2 years ago
- A curated list of amazingly awesome Burp Extensions☆3,082Updated 2 weeks ago
- Windows / Linux Local Privilege Escalation Workshop☆1,927Updated 2 years ago