Karmaz95 / crimson_lisp
Linux Post-Exploitation tools wrapper
☆20Updated 2 years ago
Alternatives and similar repositories for crimson_lisp:
Users that are interested in crimson_lisp are comparing it to the libraries listed below
- Windows Post-Exploitation tools wrapper☆12Updated 10 months ago
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- ☆47Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Custom queries list for BloodHound☆28Updated 8 months ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- ☆44Updated 10 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆22Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 8 months ago
- Scripts that automate portions of pentests.☆50Updated last week
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆21Updated 3 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- ☆13Updated 3 weeks ago
- ☆52Updated last year
- ☆15Updated last year
- ☆51Updated last year
- ☆62Updated last week
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Get Fine Grained Password Policy☆70Updated 3 weeks ago
- My BloodHound custom queries☆23Updated 2 years ago
- A small red team course☆37Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- ☆27Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 4 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago