Pinned Repositories
AD-Privesc-bloodyAD
BloodyAD is an Active Directory Privilege Escalation Framework
AutoRecon-OSCP
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
cryptopunkgenerator
Generate CryptoPunk-style avatars
DNS-ENUM-adidnsdump
Active Directory Integrated DNS dumping by any authenticated user
WhatWouldJerryDo's Repositories
WhatWouldJerryDo/AD-Privesc-bloodyAD
BloodyAD is an Active Directory Privilege Escalation Framework
WhatWouldJerryDo/AutoRecon-OSCP
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
WhatWouldJerryDo/cryptopunkgenerator
Generate CryptoPunk-style avatars
WhatWouldJerryDo/DNS-ENUM-adidnsdump
Active Directory Integrated DNS dumping by any authenticated user
WhatWouldJerryDo/dnsenum
dnsenum is a perl script that enumerates DNS information
WhatWouldJerryDo/impacket
Impacket is a collection of Python classes for working with network protocols.
WhatWouldJerryDo/linux-smart-enumeration-OSCP-PrivEsc
Linux enumeration tool for pentesting and CTFs with verbosity levels
WhatWouldJerryDo/nmapAutomator
A script that you can run in the background! (Dark Stars OSCP Toolkit)
WhatWouldJerryDo/OSCP-rdp-sec-check
rdp-sec-check is a Perl script to enumerate security settings of an RDP Service (AKA Terminal Services)
WhatWouldJerryDo/pth-toolkit
Pass-the-hash, Linux tool to run PowerShell commands on Linux
WhatWouldJerryDo/RunasCs
RunasCs - Run commands in Windows beyond that of the users privileges
WhatWouldJerryDo/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
WhatWouldJerryDo/WhatWouldJerryDo
Config files for my GitHub profile.
WhatWouldJerryDo/Womens-Rights-Supporters
List of people standing up for the rights of real, actual women.