overgrowncarrot1 / CrackEverything6Links
Crack Everything for CrackMapExec version 6
☆20Updated last year
Alternatives and similar repositories for CrackEverything6
Users that are interested in CrackEverything6 are comparing it to the libraries listed below
Sorting:
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last week
- My Favorite Offensive Security Scripts☆75Updated 3 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- ☆92Updated 2 years ago
- Learning resources and external resources to help you prepare for your offsec certifications☆85Updated 9 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- ☆37Updated 4 years ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- Tool for enumerating Active Directory environments☆48Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated last year
- Powershell tools used for Red Team / Pentesting.☆78Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- ☆45Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆78Updated last year
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- ☆170Updated 4 months ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆39Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Creating a Malicious Macro using MS Word☆23Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆22Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆155Updated 2 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆20Updated 11 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 3 months ago
- Azure Service Subdomain Enumeration☆64Updated 11 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆126Updated last year
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆142Updated 2 years ago