redcode-labs / CitadelLinks
Collection of pentesting scripts
☆440Updated 3 years ago
Alternatives and similar repositories for Citadel
Users that are interested in Citadel are comparing it to the libraries listed below
Sorting:
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆289Updated 9 months ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆292Updated 3 years ago
- TotalRecon installs all the recon tools you need☆465Updated 5 years ago
- ☆168Updated 2 years ago
- This is a collection of resources, scripts, bookmarks, writeups, notes, cheatsheets that will help you in OSCP Preparation as well as for…☆223Updated 5 years ago
- The Web Application Hacker's Handbook - Extra Content☆561Updated 2 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆217Updated 5 years ago
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.☆487Updated 4 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆648Updated 4 years ago
- JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)☆817Updated 2 years ago
- This is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet …☆365Updated 4 years ago
- OSCP cheet sheet☆198Updated 5 years ago
- 🔎 shodansploit > v1.3.0☆536Updated 2 years ago
- A polyglot payload generator☆244Updated 3 years ago
- An archive of everything related to OSCP☆625Updated 5 years ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆727Updated 3 years ago
- Automatic Service Enumeration Script☆227Updated 3 years ago
- Custom checklists, cheatsheets, links, and scripts☆128Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Network Pivoting Toolkit☆454Updated 2 years ago
- A passive subdomain finder☆334Updated 2 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆485Updated 6 years ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆764Updated 3 years ago
- This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for Th…☆560Updated 5 years ago
- wew oscp☆280Updated 3 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆281Updated last year
- Post exploitation helper☆38Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆777Updated 5 years ago
- Overlord - Red Teaming Infrastructure Automation☆628Updated last year
- Attack Surface Management since before Attack Surface Management was a thing☆657Updated this week