antman1p / Jir-Thief
A Red Team tool for exfiltrating sensitive data from Jira tickets.
☆84Updated 2 years ago
Alternatives and similar repositories for Jir-Thief:
Users that are interested in Jir-Thief are comparing it to the libraries listed below
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆76Updated this week
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆80Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 5 years ago
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- A tool for creating proxy dll for hijacking☆42Updated 4 months ago
- Exchangelib wrapper for pentesting☆59Updated last month
- Creates and sends fake meeting invite☆58Updated 3 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆99Updated 8 months ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 3 months ago
- discover IP ranges. check email security. survey domains.☆38Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago