actuated / ike-transLinks
A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive Modes. For Aggresive Mode, a custom group ID can be given. Targets can be specified as a single IP, or an input file of multiple IPs.
☆13Updated 11 months ago
Alternatives and similar repositories for ike-trans
Users that are interested in ike-trans are comparing it to the libraries listed below
Sorting:
- ☆17Updated 6 years ago
- ☆41Updated 6 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆18Updated 5 years ago
- A PowerShell script for performing a build review of a Windows host☆23Updated 6 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- SMB Named Pipe shell☆67Updated 6 months ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Updated 6 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 7 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- Enumerate RIDs using pure Python☆31Updated 10 months ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 6 years ago
- AMSI bypass stager generator☆28Updated 6 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- ☆56Updated 5 years ago
- ☆17Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- Library of sites for categorization☆26Updated 6 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 6 years ago
- Simple .NET assembly to interact with services.☆40Updated 5 years ago
- ☆20Updated 5 years ago