ZeroPointSecurity / RTOVMSetupLinks
☆10Updated 4 years ago
Alternatives and similar repositories for RTOVMSetup
Users that are interested in RTOVMSetup are comparing it to the libraries listed below
Sorting:
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Updated 4 years ago
- ☆97Updated 3 years ago
- ☆168Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- BH Cypher Queries picked up from random places☆39Updated 6 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 5 years ago
- Managed code hooking template.☆108Updated 4 years ago
- Library of sites for categorization☆28Updated 6 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆100Updated 2 years ago
- ☆78Updated 5 months ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Quick and dirty dynamic redirect.rules generator☆168Updated 3 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆142Updated 4 years ago
- Machine Learning Network Share Password Hunting Toolkit☆128Updated 5 years ago
- ☆127Updated 5 years ago
- Password Spraying Framework☆63Updated 3 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆142Updated 4 years ago
- Collection of cyphers for bloodhound☆155Updated last year
- Python based BloodHound data importer☆147Updated 2 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated last year
- Targeted Payload Execution☆100Updated 5 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆126Updated 4 years ago
- Material for the "Hands-On BloodHound" Workshop☆111Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆75Updated 3 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 5 years ago
- An Ansible role for installing Cobalt Strike.☆80Updated last month
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago