AssuranceMaladieSec / FoxTerrier
Python tool to find vulnerable AD object and generating csv report
☆26Updated 2 years ago
Alternatives and similar repositories for FoxTerrier:
Users that are interested in FoxTerrier are comparing it to the libraries listed below
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- ☆26Updated last year
- ☆20Updated 3 years ago
- ☆24Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆52Updated last year
- ☆71Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 6 months ago
- ☆43Updated 8 months ago
- ☆24Updated 3 years ago
- ☆42Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated 3 months ago
- Random☆32Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- SMB Audit Tool you were looking for☆21Updated last year
- ☆37Updated 10 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- Extract registry and NTDS secrets from local or remote disk images☆37Updated last week
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago
- Some of my custom "tools".☆22Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago