Cyb3rWard0g / log4jshell-labLinks
☆70Updated 2 years ago
Alternatives and similar repositories for log4jshell-lab
Users that are interested in log4jshell-lab are comparing it to the libraries listed below
Sorting:
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 2 months ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆93Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆75Updated last year
- Kerberoast Detection Script☆30Updated 11 months ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- ☆80Updated 5 years ago
- ☆69Updated 4 years ago
- Material for the "Hands-On BloodHound" Workshop☆110Updated 4 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- ☆28Updated 4 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆72Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 4 years ago
- Ransomware Simulator for testing Blue Team Detections☆38Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- ☆33Updated 7 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- ☆48Updated last month
- BloodHound Data Scanner☆45Updated 5 years ago
- ☆44Updated 3 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- ☆47Updated last week
- Slides and materials for conference presentations☆11Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 2 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆83Updated 2 months ago
- An Ansible role for installing Cobalt Strike.☆81Updated last week