Orange-Cyberdefense / fenrir-ocd
☆234Updated 4 years ago
Alternatives and similar repositories for fenrir-ocd:
Users that are interested in fenrir-ocd are comparing it to the libraries listed below
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆63Updated 3 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆362Updated 6 months ago
- ☆280Updated 7 years ago
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.☆247Updated last year
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆187Updated 6 months ago
- ☆238Updated 5 years ago
- This is a bash script to bypass 802.1x NAC☆95Updated last year
- Easy 802.1Q VLAN Hopping☆372Updated 8 years ago
- Rid_enum is a null session RID cycle attack for brute forcing domain controllers.☆254Updated 6 months ago
- A framework for stealthy domain reconnaissance☆298Updated 3 years ago
- Weaponizing Splunk with reverse and bind shells.☆175Updated 7 years ago
- Search for categorized domain☆441Updated 6 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 6 years ago
- An LDAP based Active Directory user and group enumeration tool☆305Updated last year
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆437Updated 7 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 7 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆304Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆392Updated 4 years ago
- Chameleon: A tool for evading Proxy categorisation☆474Updated 2 months ago
- Domain user enumeration tool☆213Updated last year
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- Malicious WMI Events using PowerShell☆376Updated 8 years ago
- Various Cheat Sheets☆180Updated 3 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- Disposable and resilient red team infrastructure with Terraform☆258Updated 5 years ago
- Post Exploitation Wiki☆514Updated 5 years ago
- locate and attack Lync/Skype for Business☆335Updated 3 months ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆228Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Obfuscated Penetration Testing PowerShell scripts☆139Updated 2 months ago