4ndr3w6 / Presentations
☆13Updated last year
Alternatives and similar repositories for Presentations:
Users that are interested in Presentations are comparing it to the libraries listed below
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Fun GUI for Group3rs output log☆37Updated last year
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated 5 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆37Updated last month
- ☆34Updated last month
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated 10 months ago
- ☆35Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆31Updated last month
- ☆42Updated last year
- Test AMSI Provider implementation in C#☆40Updated 3 months ago
- A technique for Active Directory domain persistence☆39Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆38Updated 11 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 8 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆21Updated last month
- Utilities for Pentesting with BloodHound☆17Updated this week
- Scripts to enumerate and report on Entra Conditional Access☆27Updated this week
- ☆37Updated 2 years ago
- ☆49Updated 5 months ago
- ☆19Updated 5 months ago
- Enumerate the Domain for Readable and Writable Shares☆17Updated last month
- ☆45Updated last year
- ☆43Updated 8 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 6 months ago
- ☆25Updated last week
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆35Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year