Laokoon-SecurITy / Cortex-XDR-Config-ExtractorLinks
Cortex XDR Config Extractor
☆133Updated 2 years ago
Alternatives and similar repositories for Cortex-XDR-Config-Extractor
Users that are interested in Cortex-XDR-Config-Extractor are comparing it to the libraries listed below
Sorting:
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- ☆119Updated 5 months ago
- ☆191Updated 2 weeks ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- Automated exploitation of MSSQL servers at scale☆117Updated 3 weeks ago
- Malware As A Service☆135Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆178Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆171Updated last month
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Updated 2 years ago
- Collection of random RedTeam scripts.☆208Updated last year
- PowerShell Reverse Shell☆79Updated 2 years ago
- pysnaffler☆102Updated 3 weeks ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- A Python POC for CRED1 over SOCKS5☆159Updated 11 months ago
- ☆152Updated 5 months ago
- ☆161Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆102Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year
- ☆71Updated 6 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆154Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆92Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆192Updated 3 years ago
- ☆70Updated 7 months ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆123Updated 5 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- ☆212Updated last year