#csharp #bash #batch #batch_script #color #enumeration #exe #linpe #linpeas #linux #one_liner #oneliner #peas #privesc #script #shell #unix #windows #winpeas
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite
GitHub
GitHub - peass-ng/PEASS-ng: PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) - peass-ng/PEASS-ng
#other #active_directory #active_directory_cheatsheet #active_directory_exploitation #activedirectory #attack #cheat #cheat_sheet #cheatsheet #enumeration #exploitation #hacking #hacking_cheasheet #hacking_tool #hacking_tools #penetration_testing #pentesting #privilege_escalation #security #windows #windows_active_directory
https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
GitHub
GitHub - S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods…
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. - S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
#other #active_directory #crackmapexec #cybersecurity #engagement #enumeration #exploit #hacking #lateral_movement #metasploit #meterpreter #mimikatz #nmap #penetration_testing #pentesting #privilege_escalation #redteam #script #security_tools #tools #vulnerability
https://github.com/ihebski/A-Red-Teamer-diaries
https://github.com/ihebski/A-Red-Teamer-diaries
GitHub
GitHub - ihebski/A-Red-Teamer-diaries: RedTeam/Pentest notes and experiments tested on several infrastructures related to professional…
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements. - ihebski/A-Red-Teamer-diaries
#rust #content_discovery #enumeration #hacktoberfest #pentest #pentesting_tool #url_bruteforcer #web
https://github.com/epi052/feroxbuster
https://github.com/epi052/feroxbuster
GitHub
GitHub - epi052/feroxbuster: A fast, simple, recursive content discovery tool written in Rust.
A fast, simple, recursive content discovery tool written in Rust. - epi052/feroxbuster
#other #cheatsheet #cybersecurity #enumeration #hacking #linux #payload #penetration_testing #pentest #pentest_tools #pentesting #red_team #red_team_tools #resources #security_tools #tools #windows
https://github.com/A-poc/RedTeam-Tools
https://github.com/A-poc/RedTeam-Tools
GitHub
GitHub - A-poc/RedTeam-Tools: Tools and Techniques for Red Team / Penetration Testing
Tools and Techniques for Red Team / Penetration Testing - A-poc/RedTeam-Tools
#shell #active_directory #adsecurity #automation #bloodhound #bypass_antivirus #bypass_edr #crackmapexec #enumeration #exploitation #hacking #impacket #kerberoast #penetration_testing #pentest_tool #pentesting
https://github.com/lefayjey/linWinPwn
https://github.com/lefayjey/linWinPwn
GitHub
GitHub - lefayjey/linWinPwn: linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools - lefayjey/linWinPwn
#go #attack_surfaces #dns #enumeration #go #golang #information_gathering #maltego #network_security #osint #osint_reconnaissance #owasp #recon #subdomain
OWASP Amass is a tool that helps you find and map all the parts of a company's online presence, like websites, servers, and other internet-connected assets. It uses various techniques such as checking APIs, certificates, DNS records, and web archives to gather this information. This tool is useful because it gives you a complete picture of your company's attack surface, helping you identify potential security risks and protect your assets better. You can install it easily using prebuilt packages, Docker, or by compiling it from source code. The community supports it actively, and there are many resources available to help you get started and troubleshoot any issues.
https://github.com/owasp-amass/amass
OWASP Amass is a tool that helps you find and map all the parts of a company's online presence, like websites, servers, and other internet-connected assets. It uses various techniques such as checking APIs, certificates, DNS records, and web archives to gather this information. This tool is useful because it gives you a complete picture of your company's attack surface, helping you identify potential security risks and protect your assets better. You can install it easily using prebuilt packages, Docker, or by compiling it from source code. The community supports it actively, and there are many resources available to help you get started and troubleshoot any issues.
https://github.com/owasp-amass/amass
GitHub
GitHub - owasp-amass/amass: In-depth attack surface mapping and asset discovery
In-depth attack surface mapping and asset discovery - owasp-amass/amass
👍2
#python #bounty #bugbounty #bypass #cheatsheet #enumeration #hacking #hacktoberfest #methodology #payload #payloads #penetration_testing #pentest #privilege_escalation #redteam #security #vulnerability #web_application
Payloads All The Things is a comprehensive collection of useful payloads and bypass techniques for web application security testing and penetration testing. It offers detailed documentation for each vulnerability, including how to exploit it and ready-to-use payloads, plus files for tools like Burp Intruder. You can contribute your own payloads or improvements, making it a collaborative resource. It also links to related projects for internal network and hardware pentesting, and provides learning resources like books and videos. Using this resource helps you efficiently find and test security weaknesses in web applications, improving your pentesting effectiveness and knowledge.
https://github.com/swisskyrepo/PayloadsAllTheThings
Payloads All The Things is a comprehensive collection of useful payloads and bypass techniques for web application security testing and penetration testing. It offers detailed documentation for each vulnerability, including how to exploit it and ready-to-use payloads, plus files for tools like Burp Intruder. You can contribute your own payloads or improvements, making it a collaborative resource. It also links to related projects for internal network and hardware pentesting, and provides learning resources like books and videos. Using this resource helps you efficiently find and test security weaknesses in web applications, improving your pentesting effectiveness and knowledge.
https://github.com/swisskyrepo/PayloadsAllTheThings
GitHub
GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
👍1