optiv / nvdsearch
A National Vulnerability Database (NVD) API query tool
☆18Updated last year
Alternatives and similar repositories for nvdsearch:
Users that are interested in nvdsearch are comparing it to the libraries listed below
- ☆15Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- ☆27Updated 2 years ago
- Cobalt Strike BOFS☆16Updated last year
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Exploits Unauth Docker API☆40Updated 2 weeks ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆27Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- ☆52Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 2 years ago
- Scripts that automate portions of pentests.☆50Updated this week
- .Net Assembly loader for the GMSAPasswordReader☆12Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆31Updated last month
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆39Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Tooling I utilized within the PEN300 training labs☆4Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago
- ☆2Updated 4 months ago