CyberOne-TeamARES / FallOfSudo
Pwning Sudo Rules
☆18Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for FallOfSudo
- Linux Post-Exploitation tools wrapper☆20Updated last year
- A Python based ingestor for BloodHound☆81Updated 2 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆19Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆138Updated last year
- Parses Snaffler output file and generate beautified outputs.☆37Updated 3 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆37Updated 3 weeks ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆30Updated this week
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆88Updated 3 weeks ago
- Exploit to dump ipmi hashes☆29Updated last year
- A Python POC for CRED1 over SOCKS5☆134Updated last month
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆89Updated 3 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆64Updated last month
- C# implementation of harmj0y's PowerView☆21Updated 4 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆91Updated last week
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 2 months ago
- ☆51Updated 9 months ago
- C2 Automation using Linode☆78Updated 2 years ago
- ☆32Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 8 months ago
- ☆66Updated 4 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated this week
- ☆70Updated 4 years ago
- Custom queries list for BloodHound☆20Updated 2 months ago
- ☆26Updated 2 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆14Updated 9 months ago
- Generate graphs and charts based on password cracking result☆154Updated last year
- ☆53Updated last month
- Automated exploitation of MSSQL servers at scale☆82Updated this week