DXC-StrikeForce / Nemesis-AnsibleLinks
Automatically deploy Nemesis
☆21Updated last year
Alternatives and similar repositories for Nemesis-Ansible
Users that are interested in Nemesis-Ansible are comparing it to the libraries listed below
Sorting:
- ☆42Updated 6 months ago
- Find Inbound Email Domains☆35Updated last year
- fully async implementation of Dirkjan's ROADTools☆33Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- ☆57Updated 6 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Your Skyfall Infrastructure Pack☆88Updated 3 weeks ago
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 8 months ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆44Updated 8 months ago
- SMB Audit Tool you were looking for☆23Updated 2 years ago
- Docker container for running CobaltStrike 4.7 and above☆24Updated 8 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Payload Generation Workflow☆40Updated 4 months ago
- Enumerate the Domain for Readable and Writable Shares☆23Updated 3 weeks ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- ☆29Updated 2 years ago
- ☆34Updated 4 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated 11 months ago
- ☆26Updated 9 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Updated 4 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆46Updated last month
- ☆65Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- ☆52Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆33Updated this week
- Scripts that automate portions of pentests.☆55Updated 4 months ago