redcode-labs / cheatsh-it
☆27Updated this week
Related projects: ⓘ
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆32Updated 3 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- My Python Cookiecutter project template☆29Updated 2 years ago
- ☆24Updated this week
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- A collection of OSCE preparation resources.☆23Updated 4 years ago
- ☆33Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 6 years ago
- Ansible scripts to build an attack box☆22Updated 5 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆38Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆41Updated last year
- Continuous kerberoast monitor☆43Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Data exfiltration and covert communication tool☆36Updated last year