mubix / reposLinks
List of Repositories
☆99Updated 3 years ago
Alternatives and similar repositories for repos
Users that are interested in repos are comparing it to the libraries listed below
Sorting:
- ☆153Updated 2 years ago
- Active Directory Lab for Penetration Testing☆52Updated 2 months ago
- Microsoft External Attack Tool☆179Updated 2 years ago
- Protocol agnostic online password guessing API.☆84Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆230Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆236Updated 2 years ago
- ☆53Updated 6 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- ☆80Updated 5 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆281Updated last year
- NessusV2 File Parser☆65Updated 3 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- ☆169Updated 5 years ago
- This script is a multi-threaded Okta password sprayer.☆72Updated last year
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 6 years ago
- Python template to assist with buffer overflows☆72Updated 5 years ago
- A repo to support the book☆109Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆86Updated 9 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week
- Simple parser framework.☆27Updated 2 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆148Updated 4 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 9 months ago
- Open-Source Collection of Social Engineering Pretexts☆140Updated last year
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆254Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆157Updated 4 months ago