Cyb3rWard0g / log4jshell-labLinks
☆70Updated 2 years ago
Alternatives and similar repositories for log4jshell-lab
Users that are interested in log4jshell-lab are comparing it to the libraries listed below
Sorting:
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆93Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- ☆69Updated 3 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- ☆80Updated 5 years ago
- Material for the "Hands-On BloodHound" Workshop☆110Updated 4 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 4 years ago
- Kerberoast Detection Script☆30Updated 10 months ago
- BloodHound Data Scanner☆45Updated 5 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- A repo to support the book☆109Updated 4 years ago
- An Ansible role for installing Cobalt Strike.☆80Updated last month
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆82Updated last month
- ☆108Updated 3 years ago
- ☆48Updated 8 months ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- ☆32Updated 7 years ago
- BloodHound with a twist of cloud☆81Updated 5 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- ☆27Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year