OtterHacker / AWSRedirector
☆54Updated 2 months ago
Alternatives and similar repositories for AWSRedirector:
Users that are interested in AWSRedirector are comparing it to the libraries listed below
- ☆106Updated 2 months ago
- A python script that automates a C2 Profile build☆40Updated last month
- ☆43Updated 3 weeks ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆56Updated this week
- TokenCert☆95Updated 5 months ago
- ☆55Updated 6 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆26Updated 3 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆45Updated 4 months ago
- SAM Dumping in C#☆48Updated 3 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆48Updated 2 months ago
- Sniffing files generator☆54Updated 2 months ago
- ☆50Updated 6 months ago
- Enumerate Domain Users Without Authentication☆33Updated last week
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 5 months ago
- ☆52Updated 4 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated last month
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆75Updated 2 months ago
- Lsass dumper evading (some) EDR detection☆23Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆46Updated 3 weeks ago
- Deploy a phishing infrastructure on the fly.☆68Updated 4 months ago
- ☆97Updated 8 months ago
- Adversary Emulation Framework☆98Updated 9 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆57Updated 4 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆45Updated 2 months ago
- BOF to decrypt Signal Desktop chat logs☆65Updated 2 months ago
- A Python POC for CRED1 over SOCKS5☆148Updated 7 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- OAuth Device Code Phishing Toolkit☆51Updated last week