Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations
☆12Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for BHEU22-ADFS
Users that are interested in BHEU22-ADFS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Emoji-cheat-sheet converter for Python☆10Dec 29, 2014Updated 11 years ago
- Seiso's Grand Opinionated AutoTester (GOAT)☆14Mar 16, 2026Updated last week
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Oct 1, 2016Updated 9 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- A C++, header-only DID:x509 resolver☆17Jun 11, 2025Updated 9 months ago
- This is the companion repo for Getting the Most from LINQPad Succinctly by José Roberto Olivas Mendoza. Published by Syncfusion.☆12Feb 26, 2024Updated 2 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆22Jan 26, 2025Updated last year
- ☆13Oct 21, 2023Updated 2 years ago
- ☆15May 3, 2024Updated last year
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆42Sep 23, 2021Updated 4 years ago
- Schnorr signatures for javascript☆22Apr 1, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 8 months ago
- ☆15Oct 29, 2024Updated last year
- miscellaneous codes☆36Sep 24, 2023Updated 2 years ago
- Delphi-Kawaii is a plugin for Ida Pro.☆22Jul 19, 2023Updated 2 years ago
- ☆68Dec 9, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- A python3 RC4 implementation that doesn't suck. (i.e. it's actually binary-safe...)☆19Sep 3, 2024Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Support for UASM x86 and x64 assembler in RadASM 2.2.2.x☆24Aug 18, 2022Updated 3 years ago
- Code supporting capabilities blog☆20Sep 25, 2019Updated 6 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- Recon 2023 slides and code☆79Jun 9, 2023Updated 2 years ago
- A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms☆25Feb 22, 2026Updated last month
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 7 years ago
- An x64dbg plugin which marks XFG call signatures as data☆80May 12, 2023Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆142Dec 13, 2022Updated 3 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Apr 22, 2020Updated 5 years ago
- GitHub action for validating Microsoft Sentinel detection rules☆14May 22, 2023Updated 2 years ago
- Open source form application made with Flask + pure HTML/CSS/JS.☆17Jul 9, 2024Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Mar 11, 2026Updated 2 weeks ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21May 19, 2022Updated 3 years ago
- Entra ID (Azure AD) error codes as JSON☆17Oct 30, 2025Updated 4 months ago
- suricata rules☆18Dec 26, 2024Updated last year