Leghorn code for PKI abuse
☆34Jun 17, 2021Updated 4 years ago
Alternatives and similar repositories for Invoke-Leghorn
Users that are interested in Invoke-Leghorn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- ☆36May 27, 2024Updated last year
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆141Mar 19, 2024Updated 2 years ago
- GolenGMSA tool for working with GMSA passwords☆172Aug 21, 2025Updated 7 months ago
- ☆39Oct 12, 2022Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- Automatically generated Sysmon parser for Azure Sentinel☆18Jan 6, 2026Updated 3 months ago
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 4 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 6 years ago
- Powershell Script to enumerate AzureAD and output good data☆14Nov 8, 2023Updated 2 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆64Sep 2, 2020Updated 5 years ago
- ☆31Dec 1, 2022Updated 3 years ago
- ☆20Jan 8, 2026Updated 3 months ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- ADCS abuser☆317Feb 6, 2023Updated 3 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆131Oct 10, 2021Updated 4 years ago
- History and analysis of Windows desktop images☆19Jan 28, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- Powershell script to get all user devices registered in SCCM.☆15Jul 23, 2021Updated 4 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆27Dec 1, 2022Updated 3 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- MS-FSRVP coercion abuse PoC☆302Dec 30, 2021Updated 4 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆49Mar 13, 2023Updated 3 years ago
- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.☆927Feb 28, 2024Updated 2 years ago
- ☆384Aug 7, 2023Updated 2 years ago
- ☆30Nov 7, 2022Updated 3 years ago