Scripts that automate portions of pentests.
☆57Feb 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for Internal_Pentest
Users that are interested in Internal_Pentest are comparing it to the libraries listed below
Sorting:
- ☆17Jan 9, 2025Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆81Apr 2, 2025Updated 11 months ago
- ☆49Apr 9, 2025Updated 10 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- psexecsvc - a python implementation of PSExec's native service implementation☆238Feb 11, 2025Updated last year
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- Claude MCP server to perform analysis on ROADrecon data☆48Mar 30, 2025Updated 11 months ago
- ☆58Jun 2, 2025Updated 9 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Apr 13, 2025Updated 10 months ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated last week
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- Backdooring VSCode Projects☆126Jun 5, 2025Updated 8 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- IP address filter by City☆12Jan 17, 2025Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆76Feb 24, 2026Updated last week
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- Lab used for workshop and CTF☆501Feb 3, 2026Updated last month
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆336Jun 2, 2025Updated 9 months ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 2 months ago
- ☆12May 31, 2023Updated 2 years ago
- A hoontr must hoont☆105Nov 27, 2025Updated 3 months ago
- A real fake social engineering app☆131Jul 13, 2025Updated 7 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆81Oct 20, 2023Updated 2 years ago
- ☆772May 7, 2025Updated 9 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆40Sep 23, 2025Updated 5 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Dec 12, 2025Updated 2 months ago
- macOS dylib stager☆36Jan 22, 2025Updated last year
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated last month
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year
- ☆197Apr 23, 2025Updated 10 months ago