overgrowncarrot1 / CrackEverything6Links
Crack Everything for CrackMapExec version 6
☆20Updated last year
Alternatives and similar repositories for CrackEverything6
Users that are interested in CrackEverything6 are comparing it to the libraries listed below
Sorting:
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- ☆38Updated 4 years ago
- My Favorite Offensive Security Scripts☆78Updated 7 months ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- Azure Service Subdomain Enumeration☆67Updated last year
- Decrypt Chromium based browser passwords with PowerShell.☆127Updated 3 weeks ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- LDAP Enumeration Tool for Pentesters☆48Updated 7 months ago
- ☆106Updated last year
- ☆174Updated 8 months ago
- ☆101Updated 9 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- ☆91Updated 2 years ago
- ☆79Updated 7 months ago
- a map for the azure oriented pentests☆68Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆151Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆22Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- ☆54Updated 2 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- ☆45Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆43Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆53Updated 3 years ago