Fudgedotdotdot / oceanbreezeLinks
☆16Updated last year
Alternatives and similar repositories for oceanbreeze
Users that are interested in oceanbreeze are comparing it to the libraries listed below
Sorting:
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Updated 3 years ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 8 months ago
- Ansible role that Installs Mythic☆18Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Smuggle a file to a user's browser☆20Updated 3 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated 2 years ago
- ☆42Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- Nemesis agent for Mythic☆28Updated last month
- Automatically deploy Nemesis☆21Updated last year
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 10 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Updated last month
- ☆40Updated last year
- ☆14Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆55Updated last month
- Custom queries list for BloodHound☆31Updated 6 months ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- A Pentesters Confluence Keyword Scanner☆17Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 10 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Yet Another LinkedIn Scraper☆33Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 9 months ago
- Your Skyfall Infrastructure Pack☆90Updated last week
- Top hashpwn rules☆21Updated last month