n00py / ReadingList
☆106Updated this week
Alternatives and similar repositories for ReadingList:
Users that are interested in ReadingList are comparing it to the libraries listed below
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- This project is just a dumping ground for random scripts I've developed.☆138Updated 7 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- Domain user enumeration tool☆215Updated last year
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- A list of published research documents☆241Updated 8 months ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆393Updated 4 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆120Updated 4 years ago
- locate and attack Lync/Skype for Business☆336Updated 5 months ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆303Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆169Updated 7 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- PowerShell oneliner to retrieve wdigest passwords from the memory☆219Updated 7 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆139Updated 7 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆180Updated 8 years ago
- For all your network pentesting needs☆152Updated 9 months ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- PowerDNS: Powershell DNS Delivery☆211Updated 6 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆156Updated 10 months ago
- ntlm relay attack to Exchange Web Services☆331Updated 7 years ago
- ☆272Updated 2 years ago
- Pypykatz server☆125Updated 6 years ago
- Active Directory enumeration from non-domain system.☆118Updated 8 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆169Updated last month
- The Outlook HTML Leak Test Project☆132Updated 6 years ago