CyberCX-STA / Efflanrs
Efflanrs - GUI for Snaffler Output
☆20Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for Efflanrs
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆31Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆82Updated last year
- Parses Snaffler output file and generate beautified outputs.☆37Updated 3 months ago
- ☆62Updated 7 months ago
- pysnaffler☆86Updated 3 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆147Updated 3 weeks ago
- ☆34Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆69Updated last year
- ☆98Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 7 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- A Python POC for CRED1 over SOCKS5☆134Updated last month
- Hybrid AD utilities for ROADtools☆63Updated last week
- ☆35Updated 3 years ago
- ☆0Updated 7 months ago
- Living off the land searches for explorer and sharepoint☆52Updated 3 weeks ago
- ☆36Updated last month
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆133Updated 3 months ago
- Collection of tools to use with Azure Applications☆107Updated last year
- Custom queries list for BloodHound☆20Updated 2 months ago
- Some scripts to support with importing large datasets into BloodHound☆78Updated 11 months ago
- ☆112Updated last year
- ☆51Updated last year
- Azure AD cheatsheet for the CARTP course☆97Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated this week
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated last month
- using graph proxy to monitor teams user presence☆51Updated 4 months ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago