Tools for an Offensive Certification

Commands, Payloads and Resources for an Offensive Certification.

Information Gathering

1) enum4linux https://github.com/carlospolop/PEASS-ng/tree/master/linPEASarrow-up-right

2) BloodHound https://github.com/BloodHoundAD/BloodHoundarrow-up-right

3) BloodHound Python https://github.com/fox-it/BloodHound.pyarrow-up-right

Web Application Payload & Tools

1) PayloadsAllTheThings https://github.com/swisskyrepo/PayloadsAllTheThingsarrow-up-right

2) ysoserial https://github.com/frohoff/ysoserialarrow-up-right

3) JSON Web Tokens https://jwt.io/arrow-up-right

4) WPScan https://github.com/wpscanteam/wpscan

5) Gobuster https://github.com/OJ/gobusterarrow-up-right

Encryption Tools

1) CyberChef https://gchq.github.io/CyberChef/arrow-up-right

Password Attack

1) Hydra https://github.com/vanhauser-thc/thc-hydraarrow-up-right

2) Patator https://github.com/lanjelot/patatorarrow-up-right

3) CrackMapExec https://github.com/byt3bl33d3r/CrackMapExecarrow-up-right

4) John https://github.com/openwall/johnarrow-up-right

5) hashCat https://hashcat.net/hashcatarrow-up-right

6) mimikatz https://github.com/gentilkiwi/mimikatzarrow-up-right

Reverse Engineering

1) Ghidra https://github.com/NationalSecurityAgency/ghidraarrow-up-right

Exploitation Tools

1) Rubeus https://github.com/GhostPack/Rubeusarrow-up-right

2) PTH https://github.com/byt3bl33d3r/pth-toolkitarrow-up-right

3) WinRM https://github.com/Hackplayers/evil-winrmarrow-up-right

Post Exploitation

1) LinEnum https://github.com/rebootuser/LinEnumarrow-up-right

2) Impacket https://github.com/SecureAuthCorp/impacketarrow-up-right

3) Windows Privesc Check https://github.com/pentestmonkey/windows-privesc-checkarrow-up-right

4) Windows Privilege Escalation https://github.com/frizb/Windows-Privilege-Escalationarrow-up-right

Last updated