mrd0x / secblogLinks
Cyber Security Blog
☆36Updated 7 months ago
Alternatives and similar repositories for secblog
Users that are interested in secblog are comparing it to the libraries listed below
Sorting:
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- MayorSec DNS Enumeration Tool☆89Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- ☆29Updated 4 years ago
- ☆67Updated 3 years ago
- Active Directory Cheat Sheet☆144Updated 4 years ago
- ☆65Updated 2 years ago
- ☆34Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- OSCP Study Guide☆42Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- ☆50Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Updated 3 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Your go-to resource for all things OSINT☆180Updated last year
- List of red team resources☆100Updated 8 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- Python Gmail User Enumeration Tool☆15Updated 6 months ago
- Browser extension that extracts users from LinkedIn company pages☆165Updated 2 years ago
- List of Command&Control (C2) software☆47Updated 3 years ago