bluesentinelsec / OffensiveGoLang
A collection of Offensive Go packages.
☆208Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for OffensiveGoLang
- A collection of offensive Go packages inspired by different Go repositories.☆210Updated 3 weeks ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆372Updated last year
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆377Updated 7 months ago
- ☆279Updated 3 weeks ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆480Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆426Updated last week
- a tool to help operate in EDRs' blind spots☆654Updated 7 months ago
- Malware development for red teaming workshop☆212Updated 3 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆307Updated last month
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆188Updated last month
- easy-to-use payload hosting☆264Updated 2 years ago
- A tool for pointesters to find candies in SharePoint☆240Updated 2 years ago
- ☆213Updated 2 years ago
- Roast in the Middle☆268Updated last year
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆143Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆241Updated last year
- ☆201Updated last year
- Retired TrustedSec Capabilities☆226Updated last month
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆291Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆268Updated 3 weeks ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆248Updated last year
- Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers☆374Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆216Updated 2 years ago
- ☆350Updated 3 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆413Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆198Updated 11 months ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆352Updated last month
- ☆400Updated 11 months ago