q0phi80 / Wakanda-LandLinks
☆42Updated 3 years ago
Alternatives and similar repositories for Wakanda-Land
Users that are interested in Wakanda-Land are comparing it to the libraries listed below
Sorting:
- Red Teaming & Active Directory Cheat Sheet.☆41Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- C2 Automation using Linode☆84Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆37Updated 3 years ago
- InfoSec Notes☆57Updated last year
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆92Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- ☆64Updated 4 years ago
- ☆38Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- ☆123Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- ☆47Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Updated 2 years ago
- ☆100Updated 3 years ago
- ☆52Updated last year
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- ☆13Updated 4 months ago