mubix / attackbox
Ansible scripts to build an attack box
☆23Updated 6 years ago
Alternatives and similar repositories for attackbox
Users that are interested in attackbox are comparing it to the libraries listed below
Sorting:
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- ☆36Updated 5 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Assists in mass exportation of Nessus scans☆21Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- parsers to make life easier☆13Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- Kibana app for RedELK☆17Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- ☆16Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- ☆30Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago