DanusMinimus / snallybuckster
Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!
☆27Updated 2 years ago
Alternatives and similar repositories for snallybuckster:
Users that are interested in snallybuckster are comparing it to the libraries listed below
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 9 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆42Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 2 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 11 months ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- ☆37Updated 11 months ago
- Exchangelib wrapper for pentesting☆60Updated last month
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Discord C2 Profile for Mythic☆28Updated last month
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆47Updated 3 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆34Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 3 months ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- ☆24Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Password Spraying Framework☆63Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year