Pinned Repositories
asn
ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Network recon / lookup API server / Web traceroute server
autobloody
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
BloodHound-Tools
Collection of tools that reflect the network dimension into Bloodhound's data
Cheat-Sheet---Active-Directory
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Creds
Some usefull Scripts and Executables for Pentest & Forensics
CRTP
Notes for CRTP
CRTP-CheatSheet
Notes I made while preparing for the CRTP certification exam
CRTP-cheatsheet-1
Cheatsheet for the commands learned in Attack and Defense Active Directory Lab
SharpShares
Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain
Windows-Activator
pentestical3's Repositories
pentestical3/SharpShares
Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain
pentestical3/asn
ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Network recon / lookup API server / Web traceroute server
pentestical3/autobloody
Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound
pentestical3/BloodHound-Tools
Collection of tools that reflect the network dimension into Bloodhound's data
pentestical3/Cheat-Sheet---Active-Directory
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
pentestical3/Creds
Some usefull Scripts and Executables for Pentest & Forensics
pentestical3/CRTP-CheatSheet
Notes I made while preparing for the CRTP certification exam
pentestical3/CRTP-cheatsheet-1
Cheatsheet for the commands learned in Attack and Defense Active Directory Lab
pentestical3/CobaltStr4.4
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors". Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.
pentestical3/CRTP-notes
CRTP exam notes
pentestical3/CTFd
CTFd bisa run di heroku
pentestical3/Exegol
Fully featured and community-driven hacking environment
pentestical3/firefox_decrypt
Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
pentestical3/Grouper2
Find vulnerabilities in AD Group Policy
pentestical3/Havoc
The Havoc Framework
pentestical3/hostapd-mana
SensePost's modified hostapd for wifi attacks.
pentestical3/jadx
Dex to Java decompiler
pentestical3/keyhacks
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
pentestical3/LaZagne
Credentials recovery project
pentestical3/Max
Maximizing BloodHound. Max is a good boy.
pentestical3/MFASweep
A tool for checking if MFA is enabled on multiple Microsoft Services
pentestical3/Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
pentestical3/naabu
A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
pentestical3/NetExec
The Network Execution Tool
pentestical3/ostorlab
Ostorlab is a security scanning orchestrator for the modern age.
pentestical3/pentestical3
Config files for my GitHub profile.
pentestical3/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
pentestical3/SharpCollection
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
pentestical3/SharpDPAPI
SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.
pentestical3/Stracciatella
OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at startup