r3s-ost / 5headLinks
Network penetration testing toolset wrapper
☆81Updated 3 years ago
Alternatives and similar repositories for 5head
Users that are interested in 5head are comparing it to the libraries listed below
Sorting:
- ☆55Updated last year
- a map for the azure oriented pentests☆67Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆42Updated 3 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆93Updated last year
- Azure Service Subdomain Enumeration☆66Updated last year
- Enumerate and check domains for Azure tenants☆60Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆204Updated 4 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- ☆38Updated 3 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Next generation fireprox AWS API endpoint creation utility.☆54Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Browser extension that extracts users from LinkedIn company pages☆162Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆50Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- ☆119Updated 2 years ago
- ☆101Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Custom queries list for BloodHound☆30Updated 2 months ago