Zamanry / iker
An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.
☆32Updated 3 months ago
Related projects: ⓘ
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆80Updated 3 months ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆63Updated 3 years ago
- Library of sites for categorization☆24Updated 5 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆23Updated 4 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆84Updated last year
- ☆14Updated this week
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated last year
- User enumeration and password spraying tool for testing Azure AD☆67Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆16Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆42Updated last year
- A PowerShell script for performing a build review of a Windows host☆23Updated 5 years ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆81Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆19Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- ☆40Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆80Updated last year
- Custom queries list for BloodHound☆18Updated 3 weeks ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆34Updated last year
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆27Updated 5 years ago
- Enumerate and check domains for Azure tenants☆44Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆72Updated last year
- Parses Snaffler output file and generate beautified outputs.☆29Updated last month
- ☆50Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆28Updated last year