screetsec / AD-Attack-DefenseLinks
Attack and defend active directory using modern post exploitation adversary tradecraft activity
☆12Updated 4 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below
Sorting:
- Install popular tools used while pentesting & playing labs☆13Updated 3 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 7 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Information gathering tool - OSINT☆36Updated 6 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- 🌐 Devploit v 2.3 Information Gathering Tool🕵️☆14Updated 7 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Updated 5 years ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆44Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆81Updated 5 years ago
- Parrot OS Terminal For Kali linux☆41Updated 6 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆33Updated 7 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 2 years ago
- Simple Backdoor Manager with Python (based on weevely)☆94Updated 4 months ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14Updated 6 years ago
- Everything You Need☆18Updated 4 years ago
- Embedding executable files in PDF Documents☆45Updated 6 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆15Updated 5 years ago
- Hacking Tools Z0172CK☆31Updated last year
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Metasploit Framework☆11Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆147Updated 3 years ago