pentestmonkey / pysecdump
Python-based tool to dump security information from Windows systems
☆264Updated 4 years ago
Alternatives and similar repositories for pysecdump:
Users that are interested in pysecdump are comparing it to the libraries listed below
- Repository to index useful online tools for CTF☆155Updated 3 years ago
- A ton of helpful tools☆335Updated 3 years ago
- Challenges source code☆61Updated 6 years ago
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆65Updated 5 years ago
- CTF Challenges☆125Updated last month
- Github for the scripts utilised during Penetration test☆236Updated 7 years ago
- Scripts that are useful for me on pen tests☆527Updated 2 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆505Updated 6 years ago
- Linux post exploitation enumeration and exploit checking tools☆177Updated 4 years ago
- Windows Pentest Scripts☆229Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆199Updated last year
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆569Updated 7 months ago
- Rapid Attack Infrastructure (RAI)☆303Updated last month
- Network reconnaissance and vulnerability assessment tools.☆396Updated 3 years ago
- Database of websites for penetration testing☆174Updated 5 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆281Updated 3 years ago
- Write-ups and Source-codes for CTF Challenges☆57Updated 2 months ago
- an asynchronous target enumeration tool☆242Updated 2 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆362Updated 5 months ago
- Cross-site scripting labs for web application security enthusiasts☆303Updated 3 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆548Updated 2 years ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆178Updated 6 months ago
- Post Exploitation Wiki☆515Updated 5 years ago
- Collection of different exploits☆181Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆206Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆234Updated 2 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- locate and attack Lync/Skype for Business☆335Updated 3 months ago