screetsec / AD-Attack-DefenseLinks
Attack and defend active directory using modern post exploitation adversary tradecraft activity
☆15Updated 4 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below
Sorting:
- Scripts to set up Kali Linux with additional tools, and maintain them.☆64Updated last year
- Automated rogue access point setup tool.☆197Updated 4 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆161Updated last year
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆125Updated 9 months ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆82Updated 5 years ago
- Information gathering tool - OSINT☆37Updated 6 years ago
- A collection of useful links for Pentesters☆165Updated 2 months ago
- Simple script for the WHID injector - a rubberducky wifi☆111Updated last year
- 🌐 Devploit v 2.3 Information Gathering Tool🕵️☆15Updated 7 years ago
- Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools☆57Updated 2 years ago
- BurpSuite Pro, Plugins and Payloads☆125Updated 5 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆77Updated 4 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆54Updated 4 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Updated 2 years ago
- Simple Backdoor Manager with Python (based on weevely)☆94Updated 5 months ago
- Phishing Campaign Toolkit☆13Updated 3 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 3 years ago
- Parrot OS Terminal For Kali linux☆41Updated 6 years ago
- wifi attacks suite☆59Updated 4 years ago
- My documentation and tools for learn ethical hacking.☆142Updated 4 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆11Updated 7 years ago
- Easy Mac Changer - Change your MAC Address (EASIER and FASTER than EVER)☆74Updated 6 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 7 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago