paramint / AD-Attack-DefenseLinks
☆13Updated 2 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below
Sorting:
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆38Updated last year
- ☆10Updated last year
- ☆65Updated 2 years ago
- ☆13Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆51Updated 3 years ago
- ☆29Updated 4 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆12Updated 2 months ago
- ☆91Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 8 months ago
- Chista | Open Threat Intelligence Framework☆61Updated last year
- ☆24Updated 8 months ago
- ☆41Updated 10 months ago
- Various PowerShell scripts that may be useful during red team exercise☆21Updated 3 years ago
- ☆75Updated 4 years ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆54Updated 2 months ago
- ☆28Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 3 months ago
- ☆13Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆76Updated 2 months ago
- ☆22Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆51Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆97Updated last week
- Challenge Python☆19Updated 2 years ago
- ☆21Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Red Team Guides☆140Updated last year
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago