mtimani / PrometheusLinks
Recon scripts for Red Team and Web blackbox auditing
☆25Updated last month
Alternatives and similar repositories for Prometheus
Users that are interested in Prometheus are comparing it to the libraries listed below
Sorting:
- A small red team course☆39Updated 2 years ago
- ☆59Updated 11 months ago
- Scripts that automate portions of pentests.☆53Updated 3 months ago
- ☆44Updated 3 weeks ago
- ☆92Updated 9 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- POC for DLL Proxying / Hijacking☆62Updated 5 months ago
- List of some AD tools I frequently use☆48Updated last week
- Deploy a phishing infrastructure on the fly.☆77Updated 10 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 9 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆131Updated 3 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆44Updated 4 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago
- A Moodle Scanner☆43Updated 11 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆26Updated 11 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆23Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆60Updated 3 months ago
- Vast.ai Password Kracking☆88Updated 2 weeks ago
- Sliver extension to bypass UAC via cmstp written in rust☆32Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Permanently disable EDRs as local admin☆119Updated last month
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated 11 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆83Updated 3 months ago