optiv / nvdsearch
A National Vulnerability Database (NVD) API query tool
☆18Updated last year
Alternatives and similar repositories for nvdsearch:
Users that are interested in nvdsearch are comparing it to the libraries listed below
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆78Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- ☆52Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 9 months ago
- Cobalt Strike BOFS☆15Updated last year
- ☆15Updated last year
- ☆16Updated 10 months ago
- Discord C2 Profile for Mythic☆26Updated this week
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆31Updated 11 months ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆38Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆36Updated 5 months ago
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated last year
- ☆25Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- ☆21Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆2Updated 2 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Nemesis agent for Mythic☆26Updated 5 months ago
- Public repo of Nuclei scanner templates.☆18Updated last year