Qazeer / InfoSec-Notes
InfoSec Notes
☆53Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for InfoSec-Notes
- ☆151Updated 2 weeks ago
- Living off the land searches for explorer and sharepoint☆52Updated 3 weeks ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- Powershell version of SharpGPOAbuse☆70Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- Some scripts to support with importing large datasets into BloodHound☆78Updated 11 months ago
- C2 Automation using Linode☆78Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆82Updated last year
- Azure AD enumeration over MS Graph☆80Updated last year
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆96Updated 2 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆72Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆69Updated last year
- Cortex XDR Config Extractor☆119Updated last year
- ☆118Updated last year
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆149Updated last year
- My Favorite Offensive Security Scripts☆62Updated last year
- ☆112Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆131Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135Updated last year
- Abuse Azure API permissions for red teaming☆58Updated last year
- ☆41Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆89Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆62Updated last year
- Automated exploitation of MSSQL servers at scale☆82Updated this week
- A port scanner written purely in PowerShell.☆76Updated last year