twelvesec / port-forwarding
Tunneling and Port Forwarding Cheat Sheet
☆146Updated last year
Related projects ⓘ
Alternatives and complementary repositories for port-forwarding
- A compact guide to network pivoting for penetration testings / CTF challenges.☆188Updated 3 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆148Updated this week
- Slides, documentation, and files from my presentation at Red Team Village for HackerOne's hacktivitycon.☆34Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆267Updated 2 weeks ago
- List of red team resources☆90Updated 6 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Active Directory Labs/exams Review☆242Updated 3 years ago
- AD ACL abuse☆257Updated 3 months ago
- Password spraying tool and Bloodhound integration☆212Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 3 months ago
- CLI monitor for windows process- & file activity☆76Updated 3 years ago
- Active Directory Wordlists☆84Updated 4 years ago
- Notes compiled for the OSCP exam.☆138Updated 2 years ago
- Certified Red Team Operator☆192Updated 2 years ago
- Bad scripts I made doing CTF's☆21Updated 9 months ago
- Kerberoast with ACL abuse capabilities☆331Updated 2 weeks ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆79Updated 2 years ago
- C# implementation of harmj0y's PowerView☆21Updated 4 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆383Updated 3 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆188Updated last month
- In-depth ldap enumeration utility☆422Updated this week
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆290Updated last year
- ☆104Updated 5 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆141Updated last year
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆127Updated 4 months ago
- generate payloads that force authentication against an attacker machine☆92Updated 2 years ago
- Powershell script to extract information from boot PXE☆133Updated 5 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆206Updated last year
- ☆110Updated last year
- ☆58Updated 2 years ago