n00py / ReadingList
☆106Updated last month
Alternatives and similar repositories for ReadingList:
Users that are interested in ReadingList are comparing it to the libraries listed below
- This project is just a dumping ground for random scripts I've developed.☆139Updated 8 months ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆236Updated 2 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Updated 4 years ago
- Domain user enumeration tool☆215Updated last year
- Powershell module to assist in attacking Exchange/Outlook Web Access☆181Updated 8 years ago
- Some scripts and exploits☆146Updated 6 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆183Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 4 years ago
- Pypykatz server☆125Updated 6 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆304Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆171Updated 7 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆219Updated 7 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆139Updated 7 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- ☆272Updated 2 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- ☆98Updated 6 years ago
- Various Cheat Sheets☆181Updated 3 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Updated 4 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- Exploits and advisories☆190Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Updated 7 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- PowerDNS: Powershell DNS Delivery☆212Updated 6 years ago
- A list of published research documents☆244Updated 9 months ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated 11 months ago