Rushyo / VindicateToolLinks
LLMNR/NBNS/mDNS Spoofing Detection Toolkit
☆60Updated 3 years ago
Alternatives and similar repositories for VindicateTool
Users that are interested in VindicateTool are comparing it to the libraries listed below
Sorting:
- ☆167Updated 5 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Updated 7 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆179Updated 2 years ago
- Smb Scanner from PingCastle☆125Updated 6 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆149Updated 5 years ago
- Tool for password spraying RDP☆98Updated 7 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Purple Team Security☆75Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Updated 9 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆110Updated 6 years ago
- ☆108Updated 4 years ago
- Protocol agnostic online password guessing API.☆85Updated 2 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆105Updated 2 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆116Updated 2 months ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 11 months ago
- ☆94Updated 2 months ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Updated 2 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- Linux Incident Response☆90Updated 6 years ago
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆41Updated 9 years ago
- PoSh BloodHound Dog Whisperer☆193Updated 2 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆121Updated 6 years ago