xephora / Tech-Scripts-n-GoodiesLinks
☆14Updated last month
Alternatives and similar repositories for Tech-Scripts-n-Goodies
Users that are interested in Tech-Scripts-n-Goodies are comparing it to the libraries listed below
Sorting:
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Updated last year
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆42Updated 2 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- ☆76Updated last year
- OSCP Study Guide☆42Updated 3 years ago
- ☆63Updated last month
- Red Team Templates For Obsidian.md☆32Updated 4 years ago
- ☆24Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Updated 5 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆89Updated 5 years ago
- vulnlab.com reaper writeup☆27Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated last week
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago