CICADA8-Research / LogHunter
Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)
☆63Updated 8 months ago
Alternatives and similar repositories for LogHunter:
Users that are interested in LogHunter are comparing it to the libraries listed below
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆104Updated 10 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 5 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆117Updated 4 months ago
- Source code and examples for PassiveAggression☆55Updated 8 months ago
- ☆79Updated last month
- Our Tips&Tricks☆100Updated this week
- Construct the payload at runtime using an array of offsets☆61Updated 8 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- Adversary Emulation Framework☆66Updated 6 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- Inject RDPThief into memory with PowerShell.☆60Updated 3 weeks ago
- ☆74Updated 6 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆80Updated 4 months ago
- ☆85Updated 9 months ago
- ☆54Updated 3 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- TokenCert☆93Updated 3 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆89Updated last year
- Lateral Movement☆122Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- Stage 0☆153Updated 2 months ago
- Continuous password spraying tool☆128Updated last week
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆30Updated 2 months ago
- Tool for MSSQL relay audit and abuse☆37Updated 2 months ago