C0axx / CanaryHunterLinks
Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org
☆123Updated 3 years ago
Alternatives and similar repositories for CanaryHunter
Users that are interested in CanaryHunter are comparing it to the libraries listed below
Sorting:
- DEFCON 31 slide deck and video link☆66Updated 6 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Silver SAML forgery tool☆56Updated last year
- All kinds of tiny shells☆65Updated 2 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- ☆28Updated 2 years ago
- ☆33Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- ☆41Updated last year
- ☆117Updated 4 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆72Updated last year
- ☆74Updated last week
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated last month
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- ☆94Updated 3 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 7 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 11 months ago
- create a "simulated internet" cyber range environment☆19Updated 6 months ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- ☆47Updated last month
- ☆61Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- A home for detection content developed by the delivr.to team☆73Updated 4 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆100Updated 10 months ago
- https://lolad-project.github.io/☆83Updated 11 months ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆99Updated 7 months ago
- Default Detections for EDR☆96Updated last year