HernanRodriguez1 / 1nv0k3-Rvb3us2
☆14Updated 2 years ago
Alternatives and similar repositories for 1nv0k3-Rvb3us2:
Users that are interested in 1nv0k3-Rvb3us2 are comparing it to the libraries listed below
- ☆47Updated 2 years ago
- ☆12Updated 2 years ago
- ☆12Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- ☆52Updated last year
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆25Updated last year
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Updated 5 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆12Updated 3 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆34Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆15Updated last year
- ☆13Updated last month
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Phishing Framework for OTP codes☆18Updated last week
- Creates and sends fake meeting invite☆57Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 10 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆20Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- Extra cmdlets to help with quering security related information from Azure☆13Updated 5 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago