mtimani / Prometheus
Recon scripts for Red Team and Web blackbox auditing
☆23Updated last month
Alternatives and similar repositories for Prometheus:
Users that are interested in Prometheus are comparing it to the libraries listed below
- A Moodle Scanner☆40Updated 5 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 7 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- Cobalt Strike BOFS☆15Updated last year
- ☆55Updated 5 months ago
- Situational Awareness script to identify how and where to run implants☆49Updated 4 months ago
- Scripts that automate portions of pentests.☆45Updated last week
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 6 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last week
- A small red team course☆37Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 10 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- ☆14Updated last year
- ☆54Updated 2 months ago
- ☆38Updated 2 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆28Updated 4 months ago
- Used to get NTLMv2 Hashes from SMB☆12Updated 5 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A script to automatically dump all URLs present in /server-status to a file locally.☆23Updated 2 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- List of some AD tools I frequently use☆46Updated 2 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Source code and examples for PassiveAggression☆55Updated 10 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year