Orange-Cyberdefense / leHACK-2022Links
☆17Updated 3 years ago
Alternatives and similar repositories for leHACK-2022
Users that are interested in leHACK-2022 are comparing it to the libraries listed below
Sorting:
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆72Updated last year
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- ☆86Updated 3 years ago
- ☆33Updated last year
- ☆31Updated last year
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- AutoPoC Generator HoneyPoC☆35Updated 2 weeks ago
- ☆20Updated 4 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated 2 years ago
- ☆35Updated 3 years ago
- Azure AD enumeration over MS Graph☆82Updated 3 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Custom pentesting tools☆26Updated 5 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Updated 2 years ago
- ☆110Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆16Updated last year
- RDP Checker☆65Updated last year
- DEFCON 31 slide deck and video link☆66Updated 6 months ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- ☆22Updated 2 months ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago