Unit-259 / DataBouncing
☆82Updated 10 months ago
Alternatives and similar repositories for DataBouncing:
Users that are interested in DataBouncing are comparing it to the libraries listed below
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆85Updated last month
- linikatz is a tool to attack AD on UNIX☆142Updated last year
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆109Updated 3 months ago
- Generate graphs and charts based on password cracking result☆156Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆114Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 4 months ago
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆143Updated 2 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆74Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆89Updated 2 weeks ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆163Updated 8 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 6 months ago
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- ☆77Updated 10 months ago
- ☆139Updated 3 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 2 weeks ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- My Favorite Offensive Security Scripts☆66Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆99Updated last year
- ☆147Updated 11 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆68Updated 4 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 8 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆114Updated last year
- Advanced Email Threat Hunting w/ Detection as Code☆49Updated 2 weeks ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 months ago
- a map for the azure oriented pentests☆66Updated last year