Xenov-X / PoSH_Teams_Message_Theif
Quick and dirty PoSH code to read teams messages
☆21Updated 2 years ago
Alternatives and similar repositories for PoSH_Teams_Message_Theif:
Users that are interested in PoSH_Teams_Message_Theif are comparing it to the libraries listed below
- PetitPotam fork with Kerberos support in the impacket script☆17Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- ☆20Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- ☆24Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Continuous kerberoast monitor☆44Updated last year
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆24Updated 3 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆34Updated 2 years ago
- ☆41Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆35Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆30Updated last year
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆16Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆31Updated 3 years ago
- ☆13Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- blame Huy☆42Updated 4 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆26Updated last year
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- ☆19Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago