Lists (1)
Sort Name ascending (A-Z)
Stars
Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.
How To Setup Kerberos for a Home TrueNAS Environment
Enumeration from a non-domain joined Windows computer
A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.
In this module, I will be updating the topic wise SQL tutorial notes which is very useful for a fresher to start with MYSQL from basics to advanced.
This is the work I did while learning from Walter Shields SQL QuickStart Guide
A collection of snippets of codes and commands to make your life easier!
My Kali customizations and configurations, once you finish kali setup, install ansible and let Ansible tasks do the rest of work for you.
A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers…
Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux inside with Docker with or without suppo…
A fancy self-hosted monitoring tool
Aliases and scripts to make common tasks easier.
Material for the "Hands-On BloodHound" Workshop
Commands used in Windows penetration tests
Tools for interacting with authentication packages using their individual message protocols
Cyber security, Red Teaming and CTF Writeup's.
A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking results.
Backs up all group policy settings from the current domain.
A fast and reliable Telegram channel scraper that fetches posts and exports them to JSON.
A tool to remotely detect unusual sessions opened on windows machines using RPC