reaperb0t / awesome-iot-ics-embed-pentest
☆17Updated 7 years ago
Alternatives and similar repositories for awesome-iot-ics-embed-pentest:
Users that are interested in awesome-iot-ics-embed-pentest are comparing it to the libraries listed below
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 8 months ago
- ☆23Updated 4 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆28Updated 3 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆31Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- My notebook for OSCP Lab☆25Updated 7 years ago
- Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- ☆46Updated 5 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆11Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Python3 Metasploit automation library☆21Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- DNS File EXfiltration☆46Updated 11 months ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Miscellaneous scripts for analyzing protocols and systems☆13Updated 8 years ago
- A tool for creating proxy dll for hijacking☆42Updated 4 months ago
- Remote Java classpath enumeration via deserialization☆22Updated last year
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Methods of C2☆21Updated 9 years ago