Karmaz95 / crimson_wisp
Windows Post-Exploitation tools wrapper
☆11Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for crimson_wisp
- Linux Post-Exploitation tools wrapper☆20Updated last year
- ☆43Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- ☆51Updated last year
- ☆25Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆31Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- ☆68Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated last month
- Extract registry and NTDS secrets from local or remote disk images☆33Updated 2 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated last month
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 8 months ago
- Azure pentesting reference for Altered Security Lab☆24Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆30Updated last year
- Find Inbound Email Domains☆21Updated 11 months ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆12Updated last year
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Discord C2 Profile for Mythic☆24Updated 7 months ago
- Get Fine Grained Password Policy☆65Updated 6 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated 11 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago