Karmaz95 / crimson_wisp
Windows Post-Exploitation tools wrapper
☆12Updated 8 months ago
Alternatives and similar repositories for crimson_wisp:
Users that are interested in crimson_wisp are comparing it to the libraries listed below
- Linux Post-Exploitation tools wrapper☆20Updated last year
- Get Fine Grained Password Policy☆67Updated 10 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆30Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated 11 months ago
- Extra cmdlets to help with quering security related information from Azure☆13Updated 5 months ago
- ☆52Updated last year
- ☆43Updated 7 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆42Updated 8 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 3 months ago
- ☆72Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆49Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- Random☆32Updated 2 years ago
- ☆31Updated 3 years ago
- ☆42Updated last month
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated last week
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆20Updated 3 years ago
- ☆44Updated last month
- D/Invoke standalone shellcode runners☆37Updated last year
- ☆114Updated last year
- A Python POC for CRED1 over SOCKS5☆140Updated 4 months ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆16Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- ☆36Updated 3 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆13Updated 2 years ago