sdcampbell / lpha3cho-Oh-My-Zsh-theme-for-pentestersView external linksLinks
Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.
☆47Jan 30, 2024Updated 2 years ago
Alternatives and similar repositories for lpha3cho-Oh-My-Zsh-theme-for-pentesters
Users that are interested in lpha3cho-Oh-My-Zsh-theme-for-pentesters are comparing it to the libraries listed below
Sorting:
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 2 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 6 months ago
- ☆10Oct 9, 2024Updated last year
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- Pass-thru web server for traffic redirection☆28May 6, 2019Updated 6 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- Full Antivirus Evasion for Mimikatz☆13Mar 10, 2017Updated 8 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Mar 12, 2023Updated 2 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Jan 30, 2026Updated 2 weeks ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆117Jun 12, 2024Updated last year
- Red Teaming Experiments / Offensive Security / OSCP & Pentesting Cheat Sheets and more☆18Jan 11, 2019Updated 7 years ago
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Aug 26, 2023Updated 2 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- XSS explot kit/Blind XSS framework/BurpSuite extension☆49Jun 12, 2020Updated 5 years ago