RemiEscourrou / Invoke-Leghorn
Leghorn code for PKI abuse
☆32Updated 3 years ago
Alternatives and similar repositories for Invoke-Leghorn:
Users that are interested in Invoke-Leghorn are comparing it to the libraries listed below
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆20Updated 3 years ago
- Active Directory Toolkit☆20Updated 5 years ago
- GolenGMSA tool for working with GMSA passwords☆139Updated 10 months ago
- Tool to perform lateral movement between AAD joined devices☆53Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- AD Live changes viewer☆35Updated last year
- ☆35Updated 2 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- Change up a binary's embedded resources with this little creature.☆33Updated 4 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- ☆38Updated 6 years ago
- Public scripts etc.☆19Updated last year
- ☆47Updated 4 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆71Updated 4 years ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 5 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆25Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆21Updated 8 months ago
- ☆82Updated 4 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆64Updated 4 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆27Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆119Updated last year
- ☆73Updated 3 years ago