DXC-StrikeForce / Nemesis-AnsibleLinks
Automatically deploy Nemesis
☆21Updated last year
Alternatives and similar repositories for Nemesis-Ansible
Users that are interested in Nemesis-Ansible are comparing it to the libraries listed below
Sorting:
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 3 months ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 9 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- SMB Audit Tool you were looking for☆23Updated 2 years ago
- ☆42Updated 6 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated last year
- Your Skyfall Infrastructure Pack☆89Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Find Inbound Email Domains☆35Updated 2 years ago
- Linux CS bypass technique☆32Updated 10 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Payload Generation Workflow☆40Updated 5 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- Bloodhound agent for Mythic☆23Updated 8 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆48Updated 2 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Updated 4 months ago
- A Pentesters Confluence Keyword Scanner☆15Updated last year
- IP address filter by City☆12Updated 11 months ago
- A simple to use single-include Windows API resolver☆23Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 9 months ago
- Enumerate the Domain for Readable and Writable Shares☆23Updated last month
- ☆52Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 11 months ago