Karmaz95 / crimson_wisp
Windows Post-Exploitation tools wrapper
☆12Updated 10 months ago
Alternatives and similar repositories for crimson_wisp:
Users that are interested in crimson_wisp are comparing it to the libraries listed below
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆55Updated 3 months ago
- ☆71Updated last year
- Get Fine Grained Password Policy☆70Updated last week
- ☆44Updated 9 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆17Updated 2 years ago
- Extra cmdlets to help with quering security related information from Azure☆13Updated 7 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆58Updated last week
- PowerShell Reverse Shell☆61Updated last year
- D/Invoke standalone shellcode runners☆37Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆39Updated 2 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆44Updated 4 months ago
- ☆88Updated 2 years ago
- ☆36Updated 4 years ago
- Random☆33Updated 2 years ago
- Custom queries list for BloodHound☆26Updated 7 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated last month
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆21Updated 3 years ago
- Logging tool intended for red team usage☆29Updated 2 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- ☆90Updated 2 months ago
- Shellcode generation and encoding utility☆21Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆68Updated 4 months ago