bouj33boy / Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024
Resources Links for the Research Based on Josh Prager and Nico Shyne's
☆13Updated 6 months ago
Alternatives and similar repositories for Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024:
Users that are interested in Domain-Persistence-Detection-Triage-and-Recovery-SO-CON-2024 are comparing it to the libraries listed below
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆44Updated last month
- A small go tool to upload JSON files to the BloodHound community edition API☆30Updated 10 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆29Updated 4 months ago
- ☆43Updated 2 weeks ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 9 months ago
- 🌩️ Collection of BloodHound queries for Azure☆63Updated 3 months ago
- ☆37Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆56Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- Scripts to enumerate and report on Entra Conditional Access☆29Updated 3 weeks ago
- Living off the land searches for explorer and sharepoint☆79Updated this week
- ☆50Updated 5 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆24Updated 2 months ago
- ☆88Updated 2 years ago
- Abuse Azure API permissions for red teaming☆66Updated 2 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆39Updated 2 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆38Updated 2 months ago
- Fun GUI for Group3rs output log☆37Updated last year
- BloodHound PowerShell client☆51Updated 2 weeks ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆41Updated 3 weeks ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated last month
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- ☆100Updated 2 years ago
- Efflanrs - GUI for Snaffler Output☆26Updated 7 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆71Updated last year
- AAD related enumeration in Nim☆129Updated last year
- ☆65Updated last year