aalex954 / MSFT-IP-Tracker
Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.
☆25Updated this week
Alternatives and similar repositories for MSFT-IP-Tracker:
Users that are interested in MSFT-IP-Tracker are comparing it to the libraries listed below
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆30Updated 2 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated 3 weeks ago
- Most Responder's configuration power in your hand.☆44Updated 3 weeks ago
- Tool to extract username and password of current user from PanGPA in plaintext☆82Updated last month
- A small script that automates Entra ID persistence with Windows Hello For Business key☆49Updated 7 months ago
- ☆43Updated 7 months ago
- BloodHound PowerShell client☆49Updated this week
- ☆48Updated 3 months ago
- Inject RDPThief into memory with PowerShell.☆59Updated 3 weeks ago
- Microsoft365 Device Code Phishing Framework☆35Updated 3 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 5 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated last month
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 8 months ago
- ☆25Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆45Updated 2 months ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated 8 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated last week
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 8 months ago
- ☆34Updated last year