CyberSecurityN00b / starLinks
[S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.
☆31Updated 3 years ago
Alternatives and similar repositories for star
Users that are interested in star are comparing it to the libraries listed below
Sorting:
- Ansible playbook to deploy a phishing engagement in the cloud.☆221Updated 3 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆145Updated 3 years ago
- SpecterOps Presentations☆209Updated 4 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- ☆118Updated 4 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆207Updated 2 weeks ago
- Infrastructure Automation☆356Updated last year
- OSCP Cheatsheets☆98Updated 6 years ago
- ☆122Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆236Updated 3 years ago
- More examples using the Impacket library designed for learning purposes.☆265Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Updated 2 months ago
- ☆199Updated 6 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆179Updated 6 months ago
- An active directory laboratory for penetration testing.☆141Updated 4 years ago
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆491Updated 2 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆255Updated 6 months ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Updated 2 years ago
- BloodHound Docker Ready to Use☆91Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆257Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆91Updated 3 years ago
- Dumping LAPS from Python☆280Updated 2 years ago
- ☆191Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆443Updated 3 years ago
- Kerberoast attack -pure python-☆436Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆233Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆323Updated 2 years ago
- ☆402Updated 4 years ago
- Active Directory Lab for Penetration Testing☆52Updated 3 months ago