awakecoding / wireshark-rdpLinks
Wireshark RDP resources
☆213Updated 3 weeks ago
Alternatives and similar repositories for wireshark-rdp
Users that are interested in wireshark-rdp are comparing it to the libraries listed below
Sorting:
- Active Directory delegation management tool☆301Updated 2 years ago
- ☆201Updated 7 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆184Updated 3 months ago
- ☆183Updated 2 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆373Updated 4 months ago
- ☆300Updated 7 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆259Updated 6 months ago
- Some scripts to abuse kerberos using Powershell☆341Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆289Updated 11 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆316Updated last month
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆240Updated 2 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆102Updated 9 months ago
- A collection of tools, scripts and personal research☆131Updated 2 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆226Updated last week
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆294Updated 10 months ago
- ☆189Updated last year
- ☆160Updated last year
- ☆104Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆252Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆254Updated last month
- Abusing Azure services over C2☆340Updated 3 weeks ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆243Updated 5 months ago
- Protect your Domain Controllers by auditing and restricting LDAP requests☆166Updated 3 weeks ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆232Updated 9 months ago
- ☆221Updated 2 weeks ago
- Different methods to get current username without using whoami☆177Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆328Updated 5 months ago
- ☆121Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆227Updated 8 months ago