OtterHacker / AWSRedirector
☆54Updated last month
Alternatives and similar repositories for AWSRedirector:
Users that are interested in AWSRedirector are comparing it to the libraries listed below
- ☆104Updated last month
- TokenCert☆94Updated 4 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆117Updated last month
- ☆49Updated 5 months ago
- Enumerate Domain Users Without Authentication☆30Updated 2 months ago
- ☆54Updated 5 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆118Updated 5 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated last month
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆41Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- Sniffing files generator☆55Updated last month
- Adversary Emulation Framework☆92Updated 8 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- ☆37Updated last month
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆24Updated 2 months ago
- ☆52Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆110Updated 11 months ago
- ☆78Updated 8 months ago
- ForsHops☆63Updated this week
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- ☆95Updated 6 months ago
- A python script that automates a C2 Profile build☆26Updated this week
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 5 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆72Updated 3 weeks ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆55Updated 3 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆82Updated 6 months ago
- Click Once + App Domain☆61Updated last year
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Lsass dumper evading (some) EDR detection☆22Updated last month