mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2026-02-27 13:52:58 -08:00
Change resouces AD OSINT red team
This commit is contained in:
@@ -3291,14 +3291,12 @@ Secure Email Gateway (SEG) for phishing email header (escape detection)
|
|||||||
- [revshells](https://www.revshells.com/) Reverse Shell Generator
|
- [revshells](https://www.revshells.com/) Reverse Shell Generator
|
||||||
- [enum4linux](https://github.com/CiscoCXSecurity/enum4linux) Linux alternative to enum.exe for enumerating data from Windows and Samba hosts
|
- [enum4linux](https://github.com/CiscoCXSecurity/enum4linux) Linux alternative to enum.exe for enumerating data from Windows and Samba hosts
|
||||||
- [vulmap](https://github.com/zhzyker/vulmap) Vulmap - Web vulnerability scanning and verification tools
|
- [vulmap](https://github.com/zhzyker/vulmap) Vulmap - Web vulnerability scanning and verification tools
|
||||||
- [Active-Directory-Exploitation-Cheat-Sheet](https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet) A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
|
|
||||||
- [HPING](https://github.com/antirez/hping) Hping network tool
|
- [HPING](https://github.com/antirez/hping) Hping network tool
|
||||||
- [AlliN](https://github.com/P1-Team/AlliN) A flexible scanner
|
- [AlliN](https://github.com/P1-Team/AlliN) A flexible scanner
|
||||||
- [KUNYU](https://github.com/knownsec/Kunyu) Kunyu, more efficient corporate asset collection
|
- [KUNYU](https://github.com/knownsec/Kunyu) Kunyu, more efficient corporate asset collection
|
||||||
- [jwt tool](https://github.com/ticarpi/jwt_tool) A toolkit for testing, tweaking and cracking JSON Web Tokens
|
- [jwt tool](https://github.com/ticarpi/jwt_tool) A toolkit for testing, tweaking and cracking JSON Web Tokens
|
||||||
- [jwt-secrets-list](https://github.com/wallarm/jwt-secrets/blob/master/jwt.secrets.list) possible to help developers and DevOpses identify it by traffic analysis at the Wallarm NGWAF level
|
- [jwt-secrets-list](https://github.com/wallarm/jwt-secrets/blob/master/jwt.secrets.list) possible to help developers and DevOpses identify it by traffic analysis at the Wallarm NGWAF level
|
||||||
- [aparoid](https://github.com/stefan2200/aparoid) Static and dynamic Android application security analysis
|
- [aparoid](https://github.com/stefan2200/aparoid) Static and dynamic Android application security analysis
|
||||||
- [Active Directory Cheat](https://github.com/esidate/pentesting-active-directory) Active Directory Pentesting Mind Map
|
|
||||||
- [sploitus](https://sploitus.com/) Awesome exploit list like Exploit DB
|
- [sploitus](https://sploitus.com/) Awesome exploit list like Exploit DB
|
||||||
- [thehacker recipe](https://www.thehacker.recipes/) Awesome pentesting checklist and cheat
|
- [thehacker recipe](https://www.thehacker.recipes/) Awesome pentesting checklist and cheat
|
||||||
- [OPSEC](https://github.com/WesleyWong420/OPSEC-Tradecraft) Collection of OPSEC Tradecraft and TTPs for Red Team Operations
|
- [OPSEC](https://github.com/WesleyWong420/OPSEC-Tradecraft) Collection of OPSEC Tradecraft and TTPs for Red Team Operations
|
||||||
@@ -3382,6 +3380,8 @@ Social Engineering
|
|||||||
|
|
||||||
Active Directory
|
Active Directory
|
||||||
|
|
||||||
|
- [Active Directory Cheat](https://github.com/esidate/pentesting-active-directory) Active Directory Pentesting Mind Map
|
||||||
|
- [Active-Directory-Exploitation-Cheat-Sheet](https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet) A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
|
||||||
- [Active Directory and Red Teaming attack vectors](https://github.com/zulfi0/RedTeaming_CheatSheet)
|
- [Active Directory and Red Teaming attack vectors](https://github.com/zulfi0/RedTeaming_CheatSheet)
|
||||||
- [BloodHound](https://github.com/BloodHoundAD/BloodHound)
|
- [BloodHound](https://github.com/BloodHoundAD/BloodHound)
|
||||||
- [Certify](https://github.com/GhostPack/Certify)
|
- [Certify](https://github.com/GhostPack/Certify)
|
||||||
|
|||||||
Reference in New Issue
Block a user