Karmaz95 / crimson_wispLinks
Windows Post-Exploitation tools wrapper
☆12Updated 11 months ago
Alternatives and similar repositories for crimson_wisp
Users that are interested in crimson_wisp are comparing it to the libraries listed below
Sorting:
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Custom queries list for BloodHound☆28Updated 9 months ago
- Extra cmdlets to help with quering security related information from Azure☆13Updated 9 months ago
- ☆71Updated this week
- ☆44Updated 11 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆40Updated 4 months ago
- Get Fine Grained Password Policy☆70Updated 2 months ago
- ☆28Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 2 months ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆18Updated 2 years ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Deploy a phishing infrastructure on the fly.☆69Updated 6 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆25Updated 3 months ago
- ☆47Updated 3 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆48Updated 6 months ago
- ☆52Updated 2 years ago
- D/Invoke standalone shellcode runners☆39Updated last year
- Random☆33Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆94Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆50Updated 3 weeks ago
- ☆70Updated 3 weeks ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 11 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Most Responder's configuration power in your hand.☆51Updated 5 months ago