Accenture / AARO-Bugs
Vulnerabilities, exploits, and PoCs
☆35Updated 2 months ago
Alternatives and similar repositories for AARO-Bugs:
Users that are interested in AARO-Bugs are comparing it to the libraries listed below
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Posts about different topics☆36Updated 11 months ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆38Updated 6 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- This code was used for the blogpost on secjuice.☆41Updated 5 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆59Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆71Updated 4 years ago
- Simple python script for AD enumeration☆31Updated 3 years ago
- pypykatz plugin for volatility3 framework☆39Updated 10 months ago
- ☆47Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- ☆42Updated 2 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Updated 5 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 4 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated 11 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 3 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆24Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆31Updated 2 years ago
- Loads a custom dll in system32 via diaghub.☆70Updated 4 years ago
- Sustainable shellcode evasion☆107Updated 2 months ago