BishopFox / mellonView external linksLinks
OSDP attack tool (and the Elvish word for friend)
☆109Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for mellon
Users that are interested in mellon are comparing it to the libraries listed below
Sorting:
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Apr 16, 2024Updated last year
- Collection of tools to use with Azure Applications☆112Oct 13, 2023Updated 2 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 9 months ago
- ☆12Jun 16, 2021Updated 4 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated last week
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Dec 23, 2025Updated last month
- Generate an obfuscated DLL that will disable AMSI & ETW☆329Jul 15, 2024Updated last year
- ☆80Aug 2, 2023Updated 2 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Apr 13, 2023Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆37Jun 14, 2025Updated 8 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166May 6, 2023Updated 2 years ago
- ☆94May 14, 2022Updated 3 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆345Jun 6, 2022Updated 3 years ago
- ☆83May 19, 2024Updated last year
- ☆25Feb 9, 2022Updated 4 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Sep 6, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Mar 19, 2024Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 8 months ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Oct 6, 2023Updated 2 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆186Dec 5, 2022Updated 3 years ago