CrowdStrike / OWASSRF
☆13Updated 2 years ago
Alternatives and similar repositories for OWASSRF
Users that are interested in OWASSRF are comparing it to the libraries listed below
Sorting:
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Detect WFP filters blocking EDR communications☆86Updated last year
- ☆82Updated 2 years ago
- Abuse Azure API permissions for red teaming☆66Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- Active C&C Detector☆154Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 9 months ago
- ☆246Updated last year
- ☆160Updated last year
- Lateral Movement☆123Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆173Updated 8 months ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆170Updated 3 weeks ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated 2 years ago
- A collection of tools, scripts and personal research☆128Updated last month
- ☆98Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 8 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆151Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆115Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆174Updated 2 years ago
- Protect your Domain Controllers by auditing and restricting LDAP requests☆155Updated 4 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆211Updated last week
- https://lolad-project.github.io/☆75Updated 4 months ago
- ☆178Updated 5 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- ☆192Updated 7 months ago
- BloodHound PowerShell client☆52Updated last month
- Living off the land searches for explorer and sharepoint☆82Updated 2 weeks ago
- ☆202Updated last year
- Cortex XDR Config Extractor☆132Updated 2 years ago