Accenture / AARO-BugsLinks
Vulnerabilities, exploits, and PoCs
☆36Updated 3 weeks ago
Alternatives and similar repositories for AARO-Bugs
Users that are interested in AARO-Bugs are comparing it to the libraries listed below
Sorting:
- ☆41Updated 6 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆61Updated 6 years ago
- Simple python script for AD enumeration☆31Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- ☆38Updated 5 years ago
- ☆48Updated 5 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 5 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆64Updated 5 years ago
- ☆46Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- An async Python client library for Empire's RESTful API☆25Updated last year
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆50Updated 4 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- Simple .NET assembly to interact with services.☆40Updated 5 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago