ADPunisher / Backup-Harvester
☆19Updated last year
Alternatives and similar repositories for Backup-Harvester:
Users that are interested in Backup-Harvester are comparing it to the libraries listed below
- ☆27Updated last year
- ☆25Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- ☆15Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Automatically deploy Nemesis☆20Updated 8 months ago
- Bloodhound agent for Mythic☆16Updated 5 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆14Updated last year
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆18Updated 3 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆19Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆40Updated last year
- Extra cmdlets to help with quering security related information from Azure☆13Updated 5 months ago
- Threadless Injection Payload Toolkit☆11Updated last year
- Scripts to interact with Microsoft Graph APIs☆33Updated 3 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- ☆43Updated 7 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- ☆13Updated last month
- Discord C2 Profile for Mythic☆26Updated this week