whoisflynn / hotwax
Script to provision a curated set of pentesting tools into a Kali (supported) box.
☆13Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for hotwax
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- ☆24Updated 4 years ago
- ☆34Updated 6 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 4 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- ☆16Updated 3 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- Small python script wrapper for automating hashcat commands☆35Updated 3 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- Custom pentesting tools☆24Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- ☆17Updated 3 years ago
- The New Hacking Framework☆18Updated 7 years ago
- ☆16Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆13Updated 7 years ago