Cyb3rWard0g / log4jshell-lab
☆68Updated last year
Alternatives and similar repositories for log4jshell-lab:
Users that are interested in log4jshell-lab are comparing it to the libraries listed below
- Kerberoast Detection Script☆30Updated 2 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆45Updated last week
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated this week
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- ☆68Updated 3 years ago
- ☆26Updated 3 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆67Updated 7 months ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆89Updated 2 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- ☆41Updated 9 months ago
- ☆77Updated 5 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- nse script to inject jndi payloads☆45Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated last year
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆85Updated 7 months ago
- General Content☆21Updated 6 months ago
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- Slides and materials for conference presentations☆11Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- blame Huy☆42Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated last year