CrowdStrike / OWASSRF
☆13Updated 2 years ago
Alternatives and similar repositories for OWASSRF:
Users that are interested in OWASSRF are comparing it to the libraries listed below
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Detect WFP filters blocking EDR communications☆85Updated last year
- Active C&C Detector☆152Updated last year
- ☆82Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆200Updated 3 months ago
- Lateral Movement☆123Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆168Updated 6 months ago
- Abuse Azure API permissions for red teaming☆61Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- ☆159Updated last year
- Protect your Domain Controllers by auditing and restricting LDAP requests☆151Updated 2 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆100Updated 6 months ago
- A collection of tools and detections for the Sliver C2 Frameworj☆116Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆74Updated 3 weeks ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆159Updated 3 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆137Updated 7 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆90Updated last year
- ☆193Updated 11 months ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated 5 months ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆203Updated last year
- ☆146Updated last month
- A collection of tools, scripts and personal research☆127Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 8 months ago
- ☆190Updated 6 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- Decrypt Veeam database passwords☆156Updated last year