airman604 / splunk_whisperer
☆30Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for splunk_whisperer
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆28Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆28Updated 10 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- Threat Mitigation Strategies☆25Updated last year
- Python Script for SAML2 Authentication Passwordspray☆37Updated last year
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- ☆41Updated 7 months ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- A tool to password spray Jenkins instances☆52Updated 5 years ago
- OG Atomic Red Team☆29Updated 6 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 4 months ago
- Virtual Security Operations Center☆49Updated last year
- An Ansible role for installing Cobalt Strike.☆74Updated 3 months ago
- C# User Simulation☆33Updated 2 years ago
- ☆55Updated 4 years ago
- Continuous kerberoast monitor☆44Updated last year
- Old home of LimaCharlie, open source EDR☆28Updated last year
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Spin up RedTeam infrastructure on AWS via Ansible☆59Updated 4 years ago
- Walking the PEB in VBA☆22Updated 4 years ago
- Manticore Adversary Emulation Cli☆46Updated 4 years ago