Xenov-X / PoSH_Teams_Message_ThiefLinks
Quick and dirty PoSH code to read teams messages
☆22Updated 7 months ago
Alternatives and similar repositories for PoSH_Teams_Message_Thief
Users that are interested in PoSH_Teams_Message_Thief are comparing it to the libraries listed below
Sorting:
- Continuous kerberoast monitor☆45Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- Random scripts for azure stuff☆11Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- ☆23Updated 3 years ago
- ☆13Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆53Updated 4 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆35Updated 3 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- BloodHound Data Scanner☆45Updated 5 years ago
- ☆41Updated 6 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- blame Huy☆42Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- ☆28Updated 5 years ago
- Firebase Domain Front Code☆21Updated 4 years ago