szybnev / pivotingLinks
About PIVOting
☆12Updated last year
Alternatives and similar repositories for pivoting
Users that are interested in pivoting are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆152Updated 5 months ago
- Detect common NFS server misconfigurations☆62Updated last month
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- Some nuclei templates for pentest CMS Bitrix☆32Updated last month
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- ☆110Updated last month
- Everything and anything related to password spraying☆142Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆104Updated this week
- Azure mindmap for penetration tests☆186Updated last year
- ☆170Updated 3 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- ☆65Updated 5 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 5 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆23Updated 5 months ago
- A cheatsheet for NetExec☆132Updated last month
- 1C RAS Offensive Security Tool☆26Updated last year
- Sliver CheatSheet for OSEP☆89Updated last month
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆88Updated last year
- Check bitrix vulnerabilities☆75Updated last year
- Automated exploitation of MSSQL servers at scale☆109Updated last month
- ☆93Updated 4 years ago
- Pwning Sudo Rules☆26Updated 3 years ago
- A list of all Active Directory machines from HackTheBox☆60Updated 2 weeks ago
- A Red Team Activity Hub☆214Updated last week
- winPEAS, but for Active Directory☆153Updated 3 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Creating a Malicious Macro using MS Word☆23Updated 3 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆232Updated 4 months ago