Active-Directory-Exploitation-Cheat-Sheet
A-Red-Teamer-diaries
Active-Directory-Exploitation-Cheat-Sheet | A-Red-Teamer-diaries | |
---|---|---|
2 | 1 | |
5,050 | 1,670 | |
- | - | |
4.1 | 3.1 | |
4 months ago | 8 months ago | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Active-Directory-Exploitation-Cheat-Sheet
A-Red-Teamer-diaries
What are some alternatives?
Kali-Linux-Tools-Interface - Graphical Web interface developed to facilitate the use of security information tools.
Penetration-Testing-Tools - A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
dirsearch - Web path scanner
Reconnoitre - A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
RedTeam-Tools - Tools and Techniques for Red Team / Penetration Testing
cve - Gather and update all available and newest CVEs with their PoC.
Lucifer - A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Terminhack - 👨💻 Impress your friends by pretending to be a real hacker
nfsu2-money-cheat - Money Cheat - Need For Speed Underground 2
PhoneSploit-Pro - An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
CEH-in-bullet-points - 💻 Certified ethical hacker summary in bullet points
awesome-hacker-search-engines - A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more