mzet- / z-field-manualLinks
Computer Network Exploitation (CNE) Field Manual
☆14Updated last year
Alternatives and similar repositories for z-field-manual
Users that are interested in z-field-manual are comparing it to the libraries listed below
Sorting:
- ☆22Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆38Updated this week
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- ☆29Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 7 months ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆23Updated 7 months ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆23Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Updated 2 years ago
- Red Team Server (RTS)☆16Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- C2Matrix Automation☆12Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆19Updated 4 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year