nop-tech / PentestingLinks
My Collection of exploits, reverse shells, scripts and more
☆14Updated 2 years ago
Alternatives and similar repositories for Pentesting
Users that are interested in Pentesting are comparing it to the libraries listed below
Sorting:
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last month
- ☆38Updated 4 years ago
- ☆38Updated 3 years ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- My Personal Notes of OSEP☆38Updated 2 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆24Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated last year
- ☆90Updated 7 months ago
- ☆44Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- Offensive Security OSWE Prep 2022☆74Updated 3 years ago
- ☆19Updated 2 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆21Updated last year
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated last week
- LDAP Enumeration Tool for Pentesters☆48Updated 5 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆34Updated 7 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- ☆47Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 7 months ago
- My Favorite Offensive Security Scripts☆77Updated 4 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆22Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆63Updated 8 months ago
- ☆25Updated 3 years ago
- Journey so Far☆28Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago