Downloads , Hacking Tools , Kerberos , Modification , modifyCertTemplate , NTLM , Privilege , Privilege Escalation , Vulnerable This tool is designed to aid an operator in modifying ADCS certificate templates so that a created vulnerable state can …
April 16, 2022, 2:39 AM April 16, 2022 64
bloodyAD , Downloads , Hacking Tools , Kerberos , LDAP , Neo4J , NTLM , Privesc , Privilege , Privilege Escalation , Python BloodyAD is an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combining pathgen.py …
January 28, 2022, 3:53 AM January 28, 2022 100
Downloads , Hacking Tools , Privesc , Privilege Escalation , Registry , Registry Key , Scan , Scanner , Scans , Vulnerable , Windows Reg1c1de is a tool that scans specified registry hives and reports on any keys where the user has write permissions …
August 31, 2021, 7:48 AM August 31, 2021 182
Downloads , Hacking Tools , Node , NTLM , Privilege Escalation , RPC , Server , SSH , Windows , Windows Privilege Escalation , WinRM Just another “Won’t Fix” Windows Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to …
July 12, 2021, 5:06 PM July 12, 2021 175
AWS , Downloads , Escalation , Hacking Tools , JSON , Misconfiguration , Misconfigurations , Privilege Escalation , Python , Python 3 , Research , Scanning , shadow , vulnerabilities , Vulnerability , Vulnerable Scan your AWS IAM Configuration for shadow admins in AWS IAM based on misconfigured deny policies not affecting users in …
July 1, 2021, 4:46 PM July 1, 2021 324
Downloads , Escalation , Exploitation , Hacking Tools , Hardening , Linux , Linux Kernel , Namespaces , Performance , Privilege Escalation , vulnerabilities , Vulnerability Motivation There are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major …
June 19, 2021, 2:44 PM June 19, 2021 378
Downloads , Hacking Tools , Library , Linux , Listener , Penetration Testing , Pentesting , Post-Exploitation , Privesc , Privilege Escalation , Python , Reconnaissance , Windows Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each …
June 13, 2021, 4:29 PM June 13, 2021 222
Downloads , Escalation , Exploitation , Hacking Tools , Linux , Misconfigurations , Privesc , Privilege Escalation , Redteam Tools , vulnerabilities , Vulnerability Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of …
April 14, 2021, 7:00 PM April 14, 2021 274
BloodHound , Downloads , Hacking Tools , Man In The Middle , mimikatz , NTLM Hashes , PowerShell , PowerUp , Privilege Escalation , Red Team , Windows OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises. OffensivePipeline downloads the tool …
March 20, 2021, 8:56 AM March 20, 2021 273
Downloads , Hacking Tools , Kubectl , Kubernetes , Misconfigurations , Privilege Escalation , Python , Python3 , Scan , Security Audit , Security Tools Kubestriker performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are …
March 12, 2021, 5:09 AM March 12, 2021 266