RemiEscourrou / Invoke-LeghornLinks
Leghorn code for PKI abuse
☆32Updated 4 years ago
Alternatives and similar repositories for Invoke-Leghorn
Users that are interested in Invoke-Leghorn are comparing it to the libraries listed below
Sorting:
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- BloodHound Data Scanner☆45Updated 5 years ago
- ☆23Updated 4 years ago
- blame Huy☆42Updated 5 years ago
- Tool to perform lateral movement between AAD joined devices☆66Updated 3 years ago
- LAPS module for CrackMapExec☆29Updated 4 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆127Updated 2 years ago
- Kerberoast Detection Script☆31Updated last year
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Updated last year
- A Powershell module that helps you identify AppLocker weaknesses☆172Updated 5 years ago
- ☆100Updated 5 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 3 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆106Updated last year
- ☆53Updated 5 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Updated 5 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆74Updated 5 years ago
- ☆35Updated 3 years ago
- ☆108Updated 4 years ago
- Change up a binary's embedded resources with this little creature.☆36Updated 5 years ago
- Material for the "Hands-On BloodHound" Workshop☆111Updated 4 years ago
- BloodHound with a twist of cloud☆82Updated 5 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- ☆107Updated 3 years ago
- ☆48Updated 5 years ago
- GoldenSAML Attack Libraries and Framework☆77Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Updated 5 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 5 years ago