mzet- / z-field-manualLinks
Computer Network Exploitation (CNE) Field Manual
☆14Updated last year
Alternatives and similar repositories for z-field-manual
Users that are interested in z-field-manual are comparing it to the libraries listed below
Sorting:
- ☆22Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆38Updated last month
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- ☆29Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 9 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Cisco CallManager User Enumeration☆15Updated 3 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆18Updated last year
- Red Team Server (RTS)☆16Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- ☆17Updated 3 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆23Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- CVE-2023-20198 & 0Day Implant Scanner☆32Updated 6 months ago
- A python library to interact with Pwndoc instances for pentest reports generation☆21Updated 5 months ago