screetsec / AD-Attack-DefenseLinks
Attack and defend active directory using modern post exploitation adversary tradecraft activity
☆14Updated 4 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below
Sorting:
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆83Updated 5 years ago
- Information gathering tool - OSINT☆38Updated 6 years ago
- Simple Backdoor Manager with Python (based on weevely)☆95Updated 6 months ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆65Updated 2 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 3 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆137Updated 5 years ago
- A collection of useful links for Pentesters☆168Updated 3 months ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆125Updated 10 months ago
- 🌐 Devploit v 2.3 Information Gathering Tool🕵️☆15Updated 7 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- My documentation and tools for learn ethical hacking.☆144Updated 4 years ago
- Parrot OS Terminal For Kali linux☆41Updated 6 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆55Updated 4 years ago
- Easy Mac Changer - Change your MAC Address (EASIER and FASTER than EVER)☆74Updated 6 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Updated 7 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆79Updated 4 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Updated 6 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆162Updated last year
- BurpSuite Pro, Plugins and Payloads☆122Updated 5 years ago
- Wi-Fi Exploit Tool☆51Updated 5 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 2 years ago
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆150Updated 5 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆35Updated 4 years ago