0xIapetus / RedTeamingNotesLinks
Red teaming cheatsheet for Windows Active Directory environments, featuring a meticulously curated cheatsheet that transcends traditional command lists. This resource is enriched with in-depth explanations, foundational concepts, and strategic insights, coupled with actionable operational security measures.
☆12Updated last year
Alternatives and similar repositories for RedTeamingNotes
Users that are interested in RedTeamingNotes are comparing it to the libraries listed below
Sorting:
- ☆154Updated 10 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆173Updated last month
- Weaponizing DCOM for NTLM Authentication Coercions☆275Updated 7 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆382Updated 4 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆259Updated 2 months ago
- ☆230Updated 7 months ago
- Find potential DLL Sideloads on your windows computer☆218Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆386Updated last year
- ☆166Updated 7 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆163Updated 9 months ago
- Python utility that generates "imageless" QR codes in various formats☆136Updated last year
- Payload Generation Framework☆98Updated last year
- Hybrid AD utilities for ROADtools☆106Updated 8 months ago
- ☆301Updated last year
- Custom Queries - Brought Up to BH4.1 syntax☆272Updated 2 months ago
- A tool for pointesters to find candies in SharePoint☆277Updated 3 years ago
- ☆99Updated last month
- ☆190Updated last year
- ☆235Updated 8 months ago
- ☆244Updated last year
- pysnaffler☆110Updated last month
- Malware As A Service☆137Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …