RedTeamOperations / GCPTokenReuse
☆17Updated 2 years ago
Alternatives and similar repositories for GCPTokenReuse:
Users that are interested in GCPTokenReuse are comparing it to the libraries listed below
- ☆16Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆23Updated 2 weeks ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆30Updated 2 years ago
- ☆47Updated 2 years ago
- ☆2Updated 3 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆26Updated last year
- A simple to use single-include Windows API resolver☆20Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆19Updated 2 years ago
- ☆17Updated 3 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- All my POC related to malware development☆11Updated 10 months ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆21Updated 3 years ago
- Some of my custom "tools".☆22Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆19Updated last year
- ☆52Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago