Qazeer / InfoSec-Notes
InfoSec Notes
☆56Updated 9 months ago
Alternatives and similar repositories for InfoSec-Notes:
Users that are interested in InfoSec-Notes are comparing it to the libraries listed below
- ☆155Updated 2 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆90Updated last year
- ☆96Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆72Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated last year
- Material for the "Hands-On BloodHound" Workshop☆107Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- ☆144Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Azure AD cheatsheet for the CARTP course☆102Updated 2 years ago
- Abuse Azure API permissions for red teaming☆61Updated last year
- Collection of tools to use with Azure Applications☆107Updated last year
- Automated exploitation of MSSQL servers at scale☆102Updated last week
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆250Updated 2 years ago
- GolenGMSA tool for working with GMSA passwords☆138Updated 9 months ago
- ACL abuse swiss-knife☆117Updated last year
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆106Updated 2 years ago
- ☆243Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆83Updated 8 months ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆34Updated 2 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆98Updated 6 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆99Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- C2 Automation using Linode☆78Updated 2 years ago