ZephrFish / SCCMSiteCodeHunter
☆11Updated last week
Alternatives and similar repositories for SCCMSiteCodeHunter:
Users that are interested in SCCMSiteCodeHunter are comparing it to the libraries listed below
- ☆17Updated 4 months ago
- ☆21Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 3 years ago
- ☆18Updated last year
- A simple to use single-include Windows API resolver☆21Updated 10 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- The Totally Legit Authentication Dialog☆12Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- ☆15Updated 10 months ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- ☆14Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- ☆2Updated 4 months ago
- ☆14Updated 3 years ago
- ☆12Updated 4 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 4 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆13Updated 9 months ago
- Beacon Object Files used for Cobalt Strike☆18Updated last year
- ☆19Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆14Updated last month
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- ☆18Updated 4 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- ☆11Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year