SecurityRiskAdvisors / msspray
Password attacks and MFA validation against various endpoints in Azure and Office 365
☆152Updated 2 years ago
Alternatives and similar repositories for msspray:
Users that are interested in msspray are comparing it to the libraries listed below
- ☆148Updated last month
- Modular Enumeration and Password Spraying Framework☆116Updated 11 months ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆123Updated 3 years ago
- ☆158Updated 4 months ago
- ☆186Updated last year
- ☆121Updated last year
- ☆136Updated last year
- ☆96Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- OPSEC safe Kerberoasting in C#☆190Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 3 years ago
- Inject remote template link into word document for remote template injection☆167Updated 4 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆113Updated 4 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- ☆246Updated last year
- ☆92Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆173Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆127Updated last year
- Cortex XDR Config Extractor☆131Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆253Updated last year
- GolenGMSA tool for working with GMSA passwords☆139Updated 11 months ago
- ADCS cert template modification and ACL enumeration☆135Updated last year
- Collection of tools to use with Azure Applications☆111Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆121Updated 3 years ago
- Koppeling x Metatwin x LazySign☆209Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year