- Madrid, España
- @VictorNS69
Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Collection of Notes and CheatSheets used for Red teaming Certs
NecaX / nmap-parse-output
Forked from ernw/nmap-parse-outputConverts/manipulates/extracts data from a Nmap scan output.
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
Recover the default privilege set of a LOCAL/NETWORK SERVICE account
ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.
Extract credentials from lsass remotely
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
Robofinder retrieves historical #robots.txt files from #Archive.org, allowing you to uncover previously disallowed directories and paths for any domain—essential for deepening your #OSINT and #reco…
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader
Automation for internal Windows Penetrationtest / AD-Security
PowerSploit - A PowerShell Post-Exploitation Framework
Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime patches signatures and uses SharpSploit DInvoke to PE-Load into…
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da…
jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security v…
This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples. There are multiple ways to perform the…
This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machines and CTFs with examples.
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
The recursive internet scanner for hackers. 🧡
AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,
Generates millions of keyword-based password mutations in seconds.
ImageMagick LFI PoC [CVE-2022-44268]
Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.