HCRitter / HARpwnLinks
HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitization of HARTokens from HTTP Archive (HAR) files. Simplify the process of retrieving valuable data and ensure your HAR files are safe and secure with HARpwn, where HARTokens meet 'pwnage' with a touch of humor.
☆20Updated 2 years ago
Alternatives and similar repositories for HARpwn
Users that are interested in HARpwn are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆51Updated 2 years ago
- Reportly is an AzureAD user activity report tool.☆95Updated 2 years ago
- ☆110Updated 2 years ago
- ☆47Updated 2 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆47Updated last year
- ResearchDev - XDR & SIEM Detection☆66Updated 7 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated last year
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆15Updated last year
- Powershell Script to enumerate AzureAD and output good data☆14Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆36Updated 6 months ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆25Updated last week
- Location of some Active Directory lab scripts I have created and find useful☆83Updated last week
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆42Updated 8 months ago
- A pure PowerShell solution for Entra OAuth authentication, enabling easy retrieval of access and refresh tokens☆119Updated 4 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- ☆41Updated 2 years ago
- ☆25Updated 3 years ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆130Updated 2 months ago
- A port scanner written purely in PowerShell.☆80Updated 2 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆72Updated last year
- Scripts and piece of codes used for Active Directory configuration☆81Updated 2 years ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- ☆27Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Updated last year
- ☆65Updated 3 weeks ago
- ☆107Updated 2 years ago
- Azure DevOps Services Attack Toolkit☆150Updated 8 months ago