szybnev / pivotingLinks
About PIVOting
☆11Updated last year
Alternatives and similar repositories for pivoting
Users that are interested in pivoting are comparing it to the libraries listed below
Sorting:
- Check bitrix vulnerabilities☆75Updated last year
- Some nuclei templates for pentest CMS Bitrix☆28Updated 2 weeks ago
- A cheatsheet for NetExec☆122Updated 4 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆22Updated 4 months ago
- 1C RAS Offensive Security Tool☆26Updated last year
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated 10 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆53Updated 9 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- Sliver CheatSheet for OSEP☆78Updated last week
- Personal notes used to pass the OSWP exam☆82Updated 2 years ago
- RCE Exploit For Maltrail-v0.53☆49Updated last year
- ☆92Updated 4 years ago
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆47Updated 4 months ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆10Updated last year
- ☆35Updated 3 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆21Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 3 months ago
- Make everyone in your VLAN ASRep roastable☆192Updated 3 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆153Updated last month
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆53Updated 4 months ago
- ☆70Updated last month
- Creating a Malicious Macro using MS Word☆22Updated 2 years ago
- ☆64Updated 2 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- CLI monitor for windows process- & file activity☆87Updated 4 years ago
- generate payloads that force authentication against an attacker machine☆106Updated 2 years ago
- Some tips for Bug Bounty using LibreOffice☆46Updated 3 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆43Updated 2 weeks ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago