☆107Mar 25, 2025Updated 11 months ago
Alternatives and similar repositories for ReadingList
Users that are interested in ReadingList are comparing it to the libraries listed below
Sorting:
- Please see other maintained fork:☆17Dec 4, 2025Updated 3 months ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆184Aug 13, 2024Updated last year
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A fully functional DanderSpritz lab in 2 commands☆448May 16, 2019Updated 6 years ago
- Password Spraying Framework☆64Jun 9, 2022Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- ☆526Sep 15, 2022Updated 3 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,616Dec 10, 2018Updated 7 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- A collection of useful scripts☆24Sep 12, 2018Updated 7 years ago
- ☆41May 16, 2018Updated 7 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,649Oct 11, 2018Updated 7 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆251Sep 25, 2018Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Feb 16, 2019Updated 7 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- ☆98Mar 16, 2016Updated 10 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆207May 11, 2023Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 7 months ago
- ☆20Feb 22, 2021Updated 5 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated 2 weeks ago
- Domain Password Audit Tool for Pentesters☆1,027Dec 24, 2025Updated 2 months ago
- PoSh BloodHound Dog Whisperer☆192May 23, 2023Updated 2 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆401Feb 27, 2024Updated 2 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,329Dec 6, 2023Updated 2 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Building an Active Directory domain and hacking it☆665Dec 23, 2019Updated 6 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago