Orange-Cyberdefense / leHACK-2022
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for leHACK-2022
- ☆35Updated 2 years ago
- Diana Credential Recovery Framework☆48Updated last month
- Table of AD and Azure assets and whether they belong to Tier Zero☆25Updated last year
- Ease and assist the compromise of an Active Directory environment.☆27Updated 3 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆14Updated 10 months ago
- ☆25Updated 6 months ago
- Bloodhound Portable for Windows☆51Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆30Updated 6 months ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆20Updated 3 years ago
- A swiss army knife for pentesting networks☆24Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆35Updated 2 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆44Updated 4 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆30Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆43Updated last year
- ☆22Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated last month
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- ☆34Updated 8 months ago
- AutoPoC Generator HoneyPoC☆32Updated 4 months ago
- Fun GUI for Group3rs output log☆26Updated last year
- ☆20Updated 9 months ago
- Enumerate and check domains for Azure tenants☆44Updated 2 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆18Updated 2 years ago
- ☆19Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆92Updated 3 years ago