mubix / attackbox
Ansible scripts to build an attack box
☆23Updated 6 years ago
Alternatives and similar repositories for attackbox:
Users that are interested in attackbox are comparing it to the libraries listed below
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- ☆35Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Network Finger Printer☆16Updated 7 years ago
- ☆16Updated 7 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆20Updated 3 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- parsers to make life easier☆13Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆16Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆60Updated 6 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Provides access to libhashcat☆30Updated last year
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- ☆14Updated 3 years ago