Accenture / AARO-Bugs
Vulnerabilities, exploits, and PoCs
☆35Updated 3 months ago
Alternatives and similar repositories for AARO-Bugs:
Users that are interested in AARO-Bugs are comparing it to the libraries listed below
- Exploits made practicing for OSCE☆23Updated 4 years ago
- This code was used for the blogpost on secjuice.☆42Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- pypykatz plugin for volatility3 framework☆39Updated 11 months ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- ☆39Updated 6 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆42Updated 2 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- ☆47Updated 4 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆51Updated 4 months ago
- Walking the PEB in VBA☆22Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- ☆54Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- Posts about different topics☆36Updated last year
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Loads a custom dll in system32 via diaghub.☆71Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago