rb-x / penflowLinks
A visual methodology tracking platform tailored for offensive security assessments
☆198Updated this week
Alternatives and similar repositories for penflow
Users that are interested in penflow are comparing it to the libraries listed below
Sorting:
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆208Updated 5 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆266Updated 2 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆287Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆190Updated 10 months ago
- ☆170Updated 4 months ago
- Lab used for workshop and CTF☆268Updated 2 weeks ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆121Updated last week
- ☆189Updated 4 months ago
- A blind SQL injection brute forcer☆110Updated 4 months ago
- A Red Team Activity Hub☆220Updated 3 weeks ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆224Updated 8 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Knowledge Management for Offensive Security Professionals Official Repository☆148Updated 6 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆105Updated 2 months ago
- A real fake social engineering app☆125Updated last month
- Compiled tools for internal assessments☆351Updated last week
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆394Updated last month
- A collection of tools that I use in CTF's or for assessments☆101Updated 6 months ago
- Tuoni☆131Updated last month
- Everything from my OSEP study.☆172Updated 7 months ago
- ☆153Updated 4 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated 3 weeks ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆164Updated 2 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆154Updated last year
- Azure mindmap for penetration tests☆187Updated last year
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Dredging up secrets from the depths of the file system☆131Updated 9 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆257Updated 3 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆155Updated 2 years ago