secretsquirrel / offensiveinterview
Interview questions to screen offensive (red team/pentest) candidates
☆11Updated 7 years ago
Alternatives and similar repositories for offensiveinterview:
Users that are interested in offensiveinterview are comparing it to the libraries listed below
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated 7 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆29Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Wordlist generator☆16Updated 4 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆24Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Custom pentesting tools☆24Updated 4 years ago
- A python approach to interacting with web shells.☆29Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Red Team Tool Kit☆15Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated 10 months ago
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- Staged Payloads from Kali Linux - Part 1,2 of 3☆19Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆38Updated 6 years ago
- Dehashed API CLI☆19Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆53Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- ☆34Updated 6 years ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- Subdomain Enumeration and Scanner☆33Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 9 months ago