ZephrFish / SCCMSiteCodeHunterLinks
☆13Updated 5 months ago
Alternatives and similar repositories for SCCMSiteCodeHunter
Users that are interested in SCCMSiteCodeHunter are comparing it to the libraries listed below
Sorting:
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆40Updated last year
- ☆19Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆43Updated 10 months ago
- ☆17Updated 8 months ago
- ☆18Updated 2 years ago
- ☆19Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Automatically deploy Nemesis☆21Updated last year
- Citrix Phishlet☆24Updated 4 years ago
- .NET port of Leron Gray's azbelt tool.☆26Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- ☆17Updated last year
- A simple to use single-include Windows API resolver☆23Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆15Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Updated last year
- Validates priv escalation of AD trusts☆47Updated 6 months ago
- A service container for interacting with SRA's VECTR☆12Updated 5 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆23Updated 8 months ago
- Items related to the RedELK workshop given at security conferences☆30Updated 2 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆26Updated 2 weeks ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆32Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆15Updated 6 months ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated last year
- Nemesis agent for Mythic☆27Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 11 months ago
- ☆22Updated 2 years ago