AssuranceMaladieSec / FoxTerrierLinks
Python tool to find vulnerable AD object and generating csv report
☆26Updated 3 years ago
Alternatives and similar repositories for FoxTerrier
Users that are interested in FoxTerrier are comparing it to the libraries listed below
Sorting:
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆23Updated 3 years ago
- ☆28Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- ☆27Updated 4 years ago
- ☆84Updated 2 years ago
- ☆52Updated last year
- Tradecraft Development Fundamentals☆40Updated 4 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- ☆72Updated 2 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆92Updated 2 years ago
- SMB Audit Tool you were looking for☆21Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated 2 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- Scripts to interact with Microsoft Graph APIs☆43Updated 9 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- ☆43Updated 3 years ago
- RDP Checker☆63Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last month
- ☆103Updated 2 years ago
- Discord C2 Profile for Mythic☆32Updated 6 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- ☆21Updated last year