Rushyo / VindicateToolLinks
LLMNR/NBNS/mDNS Spoofing Detection Toolkit
☆60Updated 3 years ago
Alternatives and similar repositories for VindicateTool
Users that are interested in VindicateTool are comparing it to the libraries listed below
Sorting:
- ☆168Updated 5 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆120Updated 5 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆148Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- Tool for password spraying RDP☆97Updated 6 years ago
- Protocol agnostic online password guessing API.☆84Updated 2 years ago
- My conference presentations☆83Updated last month
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆177Updated 2 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆113Updated 2 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Updated 9 years ago
- Smb Scanner from PingCastle☆124Updated 6 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 10 months ago
- Linux Incident Response☆90Updated 5 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Purple Team Security☆75Updated 3 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆41Updated 9 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 7 years ago
- ☆93Updated this week
- Detect possible sysmon logging bypasses given a specific configuration☆111Updated 6 years ago
- ☆139Updated 5 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year