Karmaz95 / crimson_wispLinks
Windows Post-Exploitation tools wrapper
☆12Updated last year
Alternatives and similar repositories for crimson_wisp
Users that are interested in crimson_wisp are comparing it to the libraries listed below
Sorting:
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- Get Fine Grained Password Policy☆70Updated 3 months ago
- ☆70Updated 3 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆40Updated last year
- ☆90Updated 5 months ago
- ☆71Updated 3 weeks ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- ☆21Updated 3 years ago
- Custom queries list for BloodHound☆29Updated last week
- Random☆34Updated 2 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- ☆44Updated last year
- ☆72Updated this week
- ☆34Updated 3 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆18Updated last year
- ☆118Updated 3 months ago
- ☆63Updated 5 months ago
- Most Responder's configuration power in your hand.☆51Updated 5 months ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆18Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 4 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- PowerShell Reverse Shell☆78Updated 2 years ago
- ☆28Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago