GossiTheDog / scanning
☆157Updated 10 months ago
Related projects: ⓘ
- Get insights into the actual strength and quality of passwords in Active Directory.☆150Updated 2 months ago
- ☆149Updated 3 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆139Updated 3 years ago
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆182Updated 8 months ago
- Active Directory Lab for Penetration Testing☆48Updated 3 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆294Updated last year
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆444Updated 2 months ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆141Updated 6 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆216Updated 2 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆87Updated 9 months ago
- ☆58Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆144Updated 2 years ago
- Audit program for AzureAD☆145Updated last year
- Collection of tools that reflect the network dimension into Bloodhound's data☆436Updated last year
- Purple Teaming Attack & Hunt Lab - Terraform☆157Updated 2 years ago
- Password Hunter in Active Directory☆193Updated last year
- Fast offline auditing of Active Directory passwords using Python.☆158Updated last month
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆231Updated 4 months ago
- ☆348Updated last month
- User enumeration with Microsoft Teams API☆164Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆213Updated 3 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆256Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆170Updated 2 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆82Updated 11 months ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆227Updated 2 years ago
- ☆111Updated 5 months ago
- PoSh BloodHound Dog Whisperer☆184Updated last year
- ☆119Updated this week