q0phi80 / Wakanda-LandLinks
☆40Updated 2 years ago
Alternatives and similar repositories for Wakanda-Land
Users that are interested in Wakanda-Land are comparing it to the libraries listed below
Sorting:
- C2 Automation using Linode☆82Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- a map for the azure oriented pentests☆67Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆51Updated last year
- ☆47Updated 3 years ago
- ☆72Updated this week
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- ☆34Updated 3 years ago
- InfoSec Notes☆56Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆91Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 6 months ago
- ☆99Updated 3 years ago
- ☆64Updated 4 years ago
- Automate the build of a vulnerable AD environment.☆37Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- ☆13Updated 3 months ago
- ☆123Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Talk slides and material☆32Updated last year