zblurx / acherus
Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources
☆14Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for acherus
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆15Updated 6 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆24Updated 6 months ago
- Recon-ng modules for basic OSINT.☆10Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆17Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 3 months ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆32Updated 3 weeks ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆14Updated last year
- Custom pentesting tools☆24Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- Miscellaneous tools for BloodHound☆18Updated 2 years ago
- wsnet☆24Updated 2 months ago
- ☆17Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆11Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 9 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 3 months ago