RemiEscourrou / Invoke-LeghornLinks
Leghorn code for PKI abuse
☆32Updated 4 years ago
Alternatives and similar repositories for Invoke-Leghorn
Users that are interested in Invoke-Leghorn are comparing it to the libraries listed below
Sorting:
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- BloodHound Data Scanner☆45Updated 5 years ago
- ☆23Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆123Updated last year
- Change up a binary's embedded resources with this little creature.☆34Updated 5 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 2 years ago
- ☆48Updated 5 years ago
- ☆35Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆66Updated 4 years ago
- blame Huy☆42Updated 4 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- ☆27Updated 4 years ago