HninKayThayar / Infrastructure-Assessment
Assessment_Note
☆4Updated 3 years ago
Related projects: ⓘ
- Iterative AD discovery toolkit for offensive operations☆85Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- A collection of OSCE preparation resources.☆23Updated 4 years ago
- ☆36Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 2 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Tests AD passwords while respecting Bad Password Count☆17Updated 5 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆16Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆77Updated 3 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆59Updated 5 years ago
- A tool to password spray Jenkins instances☆51Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆41Updated last year
- ☆18Updated this week
- ☆23Updated this week
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 5 years ago
- ☆16Updated 3 years ago
- ☆21Updated this week
- ☆28Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆28Updated 3 years ago
- ☆18Updated this week
- ☆55Updated 4 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆31Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago