Change resouces AD OSINT red team

This commit is contained in:
Jieyab89
2024-12-05 00:26:25 +07:00
parent e98a5bd093
commit 76f88e71f9

View File

@@ -3291,14 +3291,12 @@ Secure Email Gateway (SEG) for phishing email header (escape detection)
- [revshells](https://www.revshells.com/) Reverse Shell Generator - [revshells](https://www.revshells.com/) Reverse Shell Generator
- [enum4linux](https://github.com/CiscoCXSecurity/enum4linux) Linux alternative to enum.exe for enumerating data from Windows and Samba hosts - [enum4linux](https://github.com/CiscoCXSecurity/enum4linux) Linux alternative to enum.exe for enumerating data from Windows and Samba hosts
- [vulmap](https://github.com/zhzyker/vulmap) Vulmap - Web vulnerability scanning and verification tools - [vulmap](https://github.com/zhzyker/vulmap) Vulmap - Web vulnerability scanning and verification tools
- [Active-Directory-Exploitation-Cheat-Sheet](https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet) A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
- [HPING](https://github.com/antirez/hping) Hping network tool - [HPING](https://github.com/antirez/hping) Hping network tool
- [AlliN](https://github.com/P1-Team/AlliN) A flexible scanner - [AlliN](https://github.com/P1-Team/AlliN) A flexible scanner
- [KUNYU](https://github.com/knownsec/Kunyu) Kunyu, more efficient corporate asset collection - [KUNYU](https://github.com/knownsec/Kunyu) Kunyu, more efficient corporate asset collection
- [jwt tool](https://github.com/ticarpi/jwt_tool) A toolkit for testing, tweaking and cracking JSON Web Tokens - [jwt tool](https://github.com/ticarpi/jwt_tool) A toolkit for testing, tweaking and cracking JSON Web Tokens
- [jwt-secrets-list](https://github.com/wallarm/jwt-secrets/blob/master/jwt.secrets.list) possible to help developers and DevOpses identify it by traffic analysis at the Wallarm NGWAF level - [jwt-secrets-list](https://github.com/wallarm/jwt-secrets/blob/master/jwt.secrets.list) possible to help developers and DevOpses identify it by traffic analysis at the Wallarm NGWAF level
- [aparoid](https://github.com/stefan2200/aparoid) Static and dynamic Android application security analysis - [aparoid](https://github.com/stefan2200/aparoid) Static and dynamic Android application security analysis
- [Active Directory Cheat](https://github.com/esidate/pentesting-active-directory) Active Directory Pentesting Mind Map
- [sploitus](https://sploitus.com/) Awesome exploit list like Exploit DB - [sploitus](https://sploitus.com/) Awesome exploit list like Exploit DB
- [thehacker recipe](https://www.thehacker.recipes/) Awesome pentesting checklist and cheat - [thehacker recipe](https://www.thehacker.recipes/) Awesome pentesting checklist and cheat
- [OPSEC](https://github.com/WesleyWong420/OPSEC-Tradecraft) Collection of OPSEC Tradecraft and TTPs for Red Team Operations - [OPSEC](https://github.com/WesleyWong420/OPSEC-Tradecraft) Collection of OPSEC Tradecraft and TTPs for Red Team Operations
@@ -3382,6 +3380,8 @@ Social Engineering
Active Directory Active Directory
- [Active Directory Cheat](https://github.com/esidate/pentesting-active-directory) Active Directory Pentesting Mind Map
- [Active-Directory-Exploitation-Cheat-Sheet](https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet) A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
- [Active Directory and Red Teaming attack vectors](https://github.com/zulfi0/RedTeaming_CheatSheet) - [Active Directory and Red Teaming attack vectors](https://github.com/zulfi0/RedTeaming_CheatSheet)
- [BloodHound](https://github.com/BloodHoundAD/BloodHound) - [BloodHound](https://github.com/BloodHoundAD/BloodHound)
- [Certify](https://github.com/GhostPack/Certify) - [Certify](https://github.com/GhostPack/Certify)