RiccardoAncarani / talksLinks
☆43Updated 3 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- ☆35Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆63Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 4 years ago
- ☆37Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆79Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆87Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 2 years ago
- pypykatz plugin for volatility3 framework☆42Updated 3 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆39Updated 2 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- ☆31Updated 2 years ago
- ☆55Updated 3 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆26Updated 3 years ago
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- ☆23Updated 3 years ago
- A technique for Active Directory domain persistence☆39Updated 2 years ago